共查询到18条相似文献,搜索用时 46 毫秒
1.
2.
在传感器网络中,隐私保护和入侵检测是一对矛盾关系,调和两者的矛盾非常重要。在传感器网络中传感数据融合是一个基本操作,研究隐私保护和入侵检测在传感数据融合中的关系并提出一个框架,可以探测错误数据融合,但不需要知道实际的传感数据内容,因而得以保证传感数据的隐蔽性。实验结果显示,实际的原始数据和聚合传感数据可以得到很好隐蔽的同时能够检测到大部分错误数据融合。 相似文献
3.
4.
5.
无线传感器网络被广泛应(wireless sensor network,WSN)用于军事战场、环境监测等外部环境比较恶劣领域。又因为无线传感器网络依赖于无线通信,WSN节点资源受限,所以WSN安全问题相当突出。本文关注的是WSN中位置隐私保护问题,其中对源位置隐私保护进行了重点研究。文章首先对WSN的隐私保护问题进行了简单分类介绍,接着总结介绍了几种典型的源节点隐私保护方案,最后对评价源节点位置隐私保护协议有效性的协议度量标准进行了归纳总结。 相似文献
6.
随着无线传感器技术水平的提升,其所具备的应用范围不断的提升,发挥了十分重要的作用.对于网络数据安全来说,无线传感器网络数据隐私保护意义重大,由于比较容易出现窃取网络数据隐私的安全问题,需要采取相应的技术来保护网络数据隐私安全.在本文中,首先分析了无线传感器网络数据隐私面临的主要威胁,接着,在数据聚集、数据查询和访问控制三个方面分析了数据隐私保护技术,以便于提升保护的效果,保证网络数据安全. 相似文献
7.
针对无线传感器网络在数据聚合过程中存在的隐私保护与能耗节约的矛盾问题,设计了一种数据聚合隐私保护方案.在密钥分配节点联合随机密钥分配和TinyECC非交互式密钥增加数据隐私保护性.数据聚合阶段,对采集数据加入一次扰动防止基站节点入侵,对索引值加入二次扰动进一步提高数据隐私保护性,并在聚合完成后对基站节点数据进行完整性验... 相似文献
8.
移动代理已广泛用于无线传感器网络并进行数据融合。该文将移动代理用于簇成员节点间进行数据收集并进行数据融合,并提出了基于精度的量化编码的数据融合算法。该算法有效减少了冗余数据,提高了传输速率,延长了无线传感器网络的寿命,并将其应用到森林防火中去。 相似文献
9.
采用非均匀的方法部署节点,提出了一种基于数据融合的节点部署策略.针对节点数据采集率恒定的圆形网络场景,根据避免能量空洞以及降低数据冗余度的思想部署传感器节点,通过该策略使得网络达到次级能耗均衡.仿真结果表明该方法能够缓解能量空洞问题,延长网络生命周期. 相似文献
10.
如何有效降低WSN(Wiretess Sensor Net work)网内数据传输量,延长WSN的寿命,是WSN领域的研究热点.在分簇WSN基础上,实现了一种误差实时可控的数据融合算法.通过该算法,节点可自行根据近期采集的历史数据实时调整传输阈值,不同节点可保持接近的数据传输率,实现均匀耗电;自适应的阈值可以有效控制数据融合的误差.理论分析与仿真实验表明,该算法能够保证不同节点数据传输的公平性;在数据传输率相同的情况下,其求和查询及均值查询的平均绝对误差均远低于当前优秀的基于伯努利采样的数据融合方法.此算法无需先验知识,在多种WSN应用场景中具有较强的可用性与适应性. 相似文献
11.
Xiaodong Lin Rongxing Lu Xuemin Shen 《Wireless Communications and Mobile Computing》2010,10(6):843-856
In this paper, we propose a novel multidimensional privacy‐preserving data aggregation scheme for improving security and saving energy consumption in wireless sensor networks (WSNs). The proposed scheme integrates the super‐increasing sequence and perturbation techniques into compressed data aggregation, and has the ability to combine more than one aggregated data into one. Compared with the traditional data aggregation schemes, the proposed scheme not only enhances the privacy preservation in data aggregation, but also is more efficient in terms of energy costs due to its unique multidimensional aggregation. Extensive analyses and experiments are given to demonstrate its energy efficiency and practicability. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
12.
In wireless sensor networks, data aggregation protocols are used to prolong the network lifetime. However, the problem of how to perform data aggregation while preserving data privacy is challenging. This paper presents a polynomial regression‐based data aggregation protocol that preserves the privacy of sensor data. In the proposed protocol, sensor nodes represent their data as polynomial functions to reduce the amount of data transmission. In order to protect data privacy, sensor nodes secretly send coefficients of the polynomial functions to data aggregators instead of their original data. Data aggregation is performed on the basis of the concealed polynomial coefficients, and the base station is able to extract a good approximation of the network data from the aggregation result. The security analysis and simulation results show that the proposed scheme is able to reduce the amount of data transmission in the network while preserving data privacy. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
13.
Chen‐Xu Liu Yun Liu Zhen‐Jiang Zhang Zi‐Yao Cheng 《International Journal of Communication Systems》2013,26(3):380-394
An efficient data process technology is needed for wireless sensor networks composed of many sensors with constrained communication, computational, and memory resources. Data aggregation is presented as an efficient and significant method to reduce transmitted data and prolong lifetime for wireless sensor networks. Meanwhile, many applications require preserving privacy for secure data aggregation. In this paper, we propose a high energy‐efficient and privacy‐preserving scheme for secure data aggregation. Because of the importance of communication overhead and accuracy, our scheme achieves less communication overhead and higher data accuracy besides providing for privacy preservation. For extensive simulations, we evaluate and conclude the performance of our high energy‐efficient and privacy‐preserving scheme. The conclusion shows that the high energy‐efficient and privacy‐preserving scheme provides better privacy preservation and is more efficient than existing schemes. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
14.
In a Wireless Sensor Network (WSN), aggregation exploits the correlation between spatially and temporally proximate sensor data to reduce the total data volume to be transmitted to the sink. Mobile agents (MAs) fit into this paradigm, and data can be aggregated and collected by an MA from different sensor nodes using context specific codes. The MA-based data collection suffers due to large size of a typical WSN and is prone to security problems. In this article, homomorphic encryption in a clustered WSN has been proposed for secure and efficient data collection using MAs. The nodes keep encrypted data that are given to an MA for data aggregation tasks. The MA performs all the data aggregation operations upon encrypted data as it migrates between nodes in a tree-like structure in which the nodes are leafs and the cluster head is the root of the tree. It returns and deposits the encrypted aggregated data to the cluster head after traversing through all the intra cluster nodes over a shortest path route. The homomorphic encryption and aggregation processing in encrypted domain makes the data collection process secure. Simulation results confirm the effectiveness of the proposed secure data aggregation mechanism. In addition to security, MA-based mechanism leads to lesser delay and bandwidth requirements. 相似文献
15.
A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed. 相似文献
16.
传感器网络中一种基于估计代价的数据聚合树生成算法 总被引:1,自引:0,他引:1
无线传感器网络是一种全新的技术,能够广泛应用于恶劣环境和军事领域.传感器网络在数据收集中,为减少冗余数据的传输耗能,降低延迟,需要采用数据聚合技术.本文采用定向传输方式,在消息路由机制基础上提出了一种基于估计代价的数据聚合树生成算法.该算法主要思想在于将节点能耗、传输距离与聚合收益三方面作为估计代价,优化聚合路径,实现数据聚合在能量与时延上的折中. 相似文献
17.
18.
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 相似文献