通信学报 ›› 2015, Vol. 36 ›› Issue (2): 56-67.doi: 10.11959/j.issn.1000-436x.2015034

• 学术论文 • 上一篇    下一篇

两层传感器网络中安全分类协议研究

李睿1,李晋国2,陈浩1   

  1. 1 湖南大学 信息科学与工程学院,湖南 长沙 410082
    2 上海电力学院 计算机科学与技术学院,上海 200090
  • 出版日期:2015-02-25 发布日期:2017-06-27
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;中国博士后科学基金资助项目;湖南大学青年教师成长计划基金资助项目;上海电力学院引进人才启动基金资助项目

Safe and secure classification protocol in two-tiered sensor networks

Rui LI1,Jin-guo LI2,Hao CHEN1   

  1. 1 College of Information Science and Engineering,Hunan University,Changsha 410082,China
    2 College of Computer Science and Technology,Shanghai University of Electric Power,Shanghai 200090,China
  • Online:2015-02-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;China Postdoctoral Science Foundation;;Young Teacher Growth Plan of Hunan University;Startup Fund for Talent Introduction of Shanghai Universiry of Electri

摘要:

提出了一种安全分类协议SSC,该协议在保护待分类数据和分类规则隐私的情况下使存储节点进行正确分类,并且 sink 节点可以对分类结果进行抽样认证,防止妥协存储节点伪造分类结果。提出了一种不经意比较(oblivious comparison)技术MHash,该技术首先将分类需要的大小比较转换成等值比较,并进一步采用模运算和散列技术实现隐私保护下的数据分类。提出了一种“十”字邻居技术,分别将传感器以及传感器采集的数据组织成链,并采用倒置布鲁姆过滤器技术同步传感器节点之间的数据,sink利用该技术可以抽样检查存储节点分类统计结果的正确性,分析和实验结果验证了所提方案的有效性。

关键词: 两层传感器网络, 安全分类, 隐私保护, 完整性认证

Abstract:

A safe and security classification protocol named SSC was proposed for two-tiered sensor networks,which enable storage nodes to process classification correctly without knowing both the value of classifying rules and the data which will be classified.To protect privacy,an oblivious comparison technique was presented.MHash,which enable storage nodes to compare data items from sink and sensors without knowing their values.Based on MHash and prefix membership verification technique,classification target was achieved in protecting the privacy of both sensor collected data and sink issued classification rules.To verify the correctness of classification results,a crossed neighborhood technique was proposed which organize sensors and data items in one sensor in sequences,to allow the sink checking the correctness of sampling classification results.Analysis and experimental results validate the efficacy and efficiency of SSC protocol.

Key words: two-tiered sensor networks, secure classification, privacy preserving, integrity verification

No Suggested Reading articles found!