通信学报 ›› 2018, Vol. 39 ›› Issue (10): 130-142.doi: 10.11959/j.issn.1000-436x.2018101
修回日期:
2018-04-08
出版日期:
2018-10-01
发布日期:
2018-11-23
作者简介:
张晓莹(1987-),女,山东临沂人,博士,中国人民大学工程师,主要研究方向为物联网数据管理、隐私保护等。|彭辉(1986-),男,山东曲阜人,博士,工业和信息化部电子第五研究所工程师,主要研究方向为物联网数据管理、隐私保护等。|陈红(1965-),女,江西鄱阳人,博士,中国人民大学教授、博士生导师,主要研究方向为数据库、数据仓库、物联网等。
基金资助:
Xiaoying ZHANG1,2,Hui PENG3,Hong CHEN1,2()
Revised:
2018-04-08
Online:
2018-10-01
Published:
2018-11-23
Supported by:
摘要:
对无线传感器网络隐私保护数据聚集技术的研究现状与进展进行了综述。首先介绍研究相关的基础知识,包括网络模型、攻击模型和性能评估指标;然后按照同态加密、数据扰动、切分重组、泛化、安全多方计算等隐私保护技术对现有研究成果进行分类,详细阐述了具有代表性的协议的核心技术,对比分析了的各协议的性能;最后,对未来研究方向进行了展望。
中图分类号:
张晓莹,彭辉,陈红. 无线传感器网络隐私保护数据聚集技术[J]. 通信学报, 2018, 39(10): 130-142.
Xiaoying ZHANG,Hui PENG,Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks[J]. Journal on Communications, 2018, 39(10): 130-142.
表1
各隐私保护技术的优缺点"
隐私保护技术 | 主要优点 | 主要缺点 |
同态加密技术 | 能够直接聚集密文 | 同态加密函数的构造复杂 |
仅支持加法类聚集 | ||
数据扰动技术 | 实现简单 | 扰动的管理复杂 |
切分重组技术 | 隐私性较强 | 通信开销较大 |
容易发生数据碰撞 | ||
泛化技术 | 支持多种聚集类型 | 结果不精确 |
泄露敏感数据的特征信息 | ||
安全多方计算技术 | 结果精确 | 实现依赖于其他参与者 |
匿名技术 | 无需加密 | 通信开销较大 |
存在隐私泄露风险 | ||
前缀成员验证技术 | 隐私保护能力较强 | 仅支持极值聚集 |
通信开销较大 | ||
Z-O编码比较技术 | 隐私性较强 | 仅支持极值聚集 |
通信开销较大 | ||
多项式内插技术 | 隐私性较强 | 多项式计算复杂 |
通信开销较大 | ||
多项式回归技术 | 隐私性较强 | 结果不精确 |
[1] | AKYILDIZ I F , SU W , SANKARASUBRAMANIAM Y ,et al. Wireless sensor networks:a survey[J]. Computer Networks, 2002,38(4): 393-422. |
[2] | SAMUEL M , FRANKLIN M J , HELLERSTEIN J M ,et al. TAG:A tiny aggregation service for ad-hoc sensor networks[J]. OSDI, 2002,36(SI): 131-146. |
[3] | GIR?O J , WESTHOFF D , SCHNEIDER M . CDA:Concealed data aggregation for reverse multicast traffic in wireless sensor networks[J]. ICC, 2005 3044-3049. |
[4] | GOLDREICH O . Foundations of cryptography:a primer[M]. Boston: Now Publishers IncPress, 2005. |
[5] | SHENG B , LI Q . Verifiable privacy-preserving range query in two-tiered sensor networks[J]. INFOCOM, 2008 46-50. |
[6] | SZEWCZYK R , FERENCZ A . Energy implication of network sensor designs[EB]. 2016. |
[7] | RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms[J]. Foundations of secure computation, 1978,4(11): 169-180. |
[8] | WESTHOFF D , GIR?O J , ACHARYA M . Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J]. IEEE Trans.Mob.Comput, 2006,5(10): 1417-1431. |
[9] | DOMINGO-FERRER J , . A provably secure additive and multiplicative privacy homomorphism[C]// ISC. 2002: 471-483. |
[10] | SICARI S , GRIECO L A , BOGGIA G ,et al. DyDAP:a dynamic data aggregation scheme for privacy aware wireless sensor networks[J]. Journal of Systems and Software, 2012,85(1): 152-166. |
[11] | MASTROCRISTINO T , TESORIERE G , GRIECO L A ,et al. Congestion control based on data-aggregation for wireless sensor networks[C]// International Symposium on Industrial Electronics. 2010: 3386-3391. |
[12] | CASTELLUCCIA C , MYKLETUN E , TSUDIK G ,et al. Efficient aggregation of encrypted data in wireless sensor networks[C]// MobiQuitous. 2005: 109-117. |
[13] | VERNAM G S . Cipher printing telegraph systems for secret wire and radio telegraphic communications[J]. Transactions of the American In stitute of Electrical Engineers, 1926,45(2): 295-301. |
[14] | CRISTOFARO E D , . A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks[C]// WOWMOM. 2007: 1-5. |
[15] | CHAN H , PERRIG A , SONG D . Secure hierarchical in-network aggregation in sensor networks[C]. ACM Conference on Computer and Communications Security, 2006: 278-287. |
[16] | CASTELLUCCIA C , CHAN A , MYKLETUN E ,et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks[J]. TOSN, 2009,5(3):20: 1-20. |
[17] | PRZYDATEK B , SONG D , PERRIG A . SIA:secure information aggregation in sensor networks[C]// SenSys. 2003: 255-265. |
[18] | CHAN H , PERRIG A , PRZYDATEK B ,et al. SIA:secure information aggregation in sensor networks[J]. Journal of Computer Security, 2007,15(1): 69-102. |
[19] | YANG Y , WANG X , ZHU S ,et al. SDAP:A secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Trans.Inf.Syst.Secur., 2008,11(4): 18:1-18:43. |
[20] | ISKANDER M K , LEE A J . Privacy and robustness for data aggregation in wireless sensor networks[C]// ACM Conference on Computer and Communications Security. 2010: 699-701. |
[21] | GOBRIEL S , KHATTAB S , MOSSé D .et al. RideSharing:fault tolerant aggregation in sensor networks using corrective actions[C]// SECON. 2006: 595-604. |
[22] | OZDEMIR S , XIAO Y . Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011,55(8): 1735-1746. |
[23] | DAN B , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts[C]// TCC. 2005: 325-341. |
[24] | PAPADOPOULOS S , KIAYIAS A , PAPADIAS D . Secure and efficient in-network processing of exact SUM queries[C]// ICDE. 2011: 517-528. |
[25] | MENEZES A J , OORSCHOT P V , VANSTONE S A . Handbook of applied cryptography[M]. Florida: CRC PressPress, 1996. |
[26] | PERRIG A , SZEWCZYK R , WEN V ,et al. SPINS:Security Protocols for Sensor Networks[J]. Wireless Networks, 2002,8(5): 521-534. |
[27] | KUMAR V , MADRIA S K . Secure hierarchical data aggregation in wireless sensor networks:performance evaluation and analysis[C]// MDM. 2012: 196-201. |
[28] | MYKLETUN E , GIR?O J , WESTHOFF D . Public key based crypto schemes for data concealment in wireless sensor networks[C]// ICC. 2006: 2288-2295. |
[29] | SUN H M , LIN Y H , HSIAO Y C ,et al. An efficient and verifiable concealed data aggregation scheme in wireless sensor networks[C]// ICESS. 2008: 19-26. |
[30] | ZHOU Q , YANG G , HE L . An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks[J]. IJDSN, 2014(7): 962-925. |
[31] | CHAN C F , . Symmetric-key homomorphic encryption for encrypted data processing[C]// ICC. 2009: 1-5. |
[32] | AGRAWAL S , DAN B . Homomorphic MACs:MAC-based integrity for network coding[C]// ACNS, 2009: 292-305. |
[33] | MERAD B O R , SENOUCI S M , FEHAM M . Secure and efficient verification for data aggregation in wireless sensor networks[J]. Journal of Network Management, 2018(28).:e2000 |
[34] | SHIM K A , PARK C M . A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks[J]. IEEE Trans.Parallel Distrib.Syst, 2015,26(8): 2128-2139. |
[35] | ARA A , AL-RODHAAN M , YUAN T ,et al. A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems[J]. IEEE Access, 2017(5): 12601-12617. |
[36] | ZHU H , GAO L , LI H . Secure and privacy-preserving body sensor data collection and query scheme[J]. Sensors, 2016,16(2):179. |
[37] | XIE K , NING X , WANG X ,et al. An efficient privacy-preserving compressive data gathering scheme in WSNs[J]. Inf.Sci. 2017(390): 82-94. |
[38] | TONYALI S , AKKAYA K , SAPUTRO N ,et al. Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems[J]. Future Generation Comp.Syst, 2018(78): 547-557. |
[39] | ZHANG L , WANG X , LU J ,et al. An efficient privacy preserving data aggregation approach for mobile sensing[J]. Security and Communication, 2016,9(16): 3844-3853 |
[40] | CHEN C M , LIN Y H , LIN Y C ,et al. RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Trans.Parallel Distrib.Syst., 2012,23(4): 727-734. |
[41] | ZHANG K , HAN Q , CAI Z ,et al. RiPPAS:a ring-based privacy-preserving aggregation scheme in wireless sensor networks[J]. Sensors, 2017,17(2):300. |
[42] | ZHONG H , SHAO L , CUI J ,et al. An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks[J]. J.Parallel Distrib.Comput, 2018(111): 1-12. |
[43] | ZHANG P , WANG J , GUO K ,et al. Multi-functional secure data aggregation schemes for WSNs[J]. Ad Hoc Networks, 2018(69): 86-99. |
[44] | ADAM N R , WORTMANN J C . Security-control methods for statistical databases:a comparative study[C]// ACM Comput.Surv. 1989,21(4): 515-556. |
[45] | XIAO X , TAO Y , CHEN M . Optimal Random perturbation at multiple privacy levels[J]. PVLDB, 2009,2(1): 814-825. |
[46] | HE W , LIU X , NGUYEN H ,et al. PDA:privacy-preserving data aggregation in wireless sensor networks[C]// INFOCOM. 2007: 2045-2053. |
[47] | HE W , LIU X , NGUYEN H ,et al. PDA:privacy-preserving data aggregation for information collection[J]. TOSN, 2011,8(1): 6:1-6:22. |
[48] | FENG T , WANG C , ZHANG W ,et al. Confidentiality protection for distributed sensor data aggregation[C]// INFOCOM, 2008: 56-60. |
[49] | LIN X , LU R , SHEN X . MDPA:multidimensional privacy-preserving aggregation scheme for wireless sensor networks[J]. Communications and Mobile Computing, 2010,10(6): 843-856. |
[50] | YAO Y , LIU J , XIONG N N . Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes[J]. Sensors, 2014,14(11): 21174-21194. |
[51] | HAI V , NGUYEN T , MITTAL N ,et al. PEQ:a privacy-preserving scheme for exact query evaluation in distributed sensor data networks[C]// SRDS. 2009: 189-198. |
[52] | LI H , LIN K , LI K . Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communications, 2011,34(4): 591-597. |
[53] | LI C , LIU Y . ESMART:energy-efficient slice-mix-aggregate for wireless sensor network[J]. IJDSN, 2013 |
[54] | LIU C , LIU Y , ZHANG Z ,et al. High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks[J]. International Journal of Communication Systems, 2013,26(3): 380-394. |
[55] | 王涛春, 秦小麟, 刘亮 ,等. 无线传感器网络中安全高效的空间数据聚集算法[J]. 软件学报, 2014,25(8): 1671-1684. |
WANG T C , QIN X L , LIU L ,et al. Secure and Energy-Efficient Spatial Data Aggregation Algorithm in Wireless Sensor Networks[J]. Journal of Software, 2014,25(8): 1671-1684. | |
[56] | 杨庚, 王安琪, 陈正宇 ,等. 一种低耗能的数据融合隐私保护算法[J]. 计算机学报, 2011,34(5): 792-800. |
YANG G , WANG A Q , CHEN Z D ,et al. An Energy-Saving Privacy-Preserving Data Aggregation Algorithm[J]. Chinese Journal of Computers, 2011,34(5): 792-800 | |
[57] | ZHANG C , LI C , ZHAO Y . A balance privacy-preserving data aggregation model in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2015,501:937280. |
[58] | WANG J , CHEN Y . Research and improvement of wireless sensor network secure data aggregation protocol based on SMART[J]. International Journal of Wireless Information Networks, 2018(11): 1-9. |
[59] | 杨庚, 李森, 陈正宇 ,等. 传感器网络中面向隐私保护的高精确度数据融合算法[J]. 计算机学报, 2013,36(1): 189-200. |
YANG G , LI S , CHEN ZY ,et al. High-Accuracy and Privacy-Preserving Oriented Data Aggregation Algorithm in Sensor Networks[J]. Chinese Journal of Computers, 2013,36(1): 189-200 | |
[60] | YANG G , LI S , XU X ,et al. Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks[J]. IJDSN, 2013. |
[61] | XU Y , LEE W , XU J ,et al. Processing window queries in wireless sensor networks[C]// ICDE. 2006: 70-70. |
[62] | SHI J , ZHANG R , LIU Y ,et al. PriSense:privacy-preserving data aggregation in people-centric urban sensing systems[J]. INFOCOM, 2010: 758-766. |
[63] | HE W , NGUYEN H , LIU X ,et al. iPDA:an integrity-protecting private data aggregation scheme for wireless sensor networks[C]// MILCOM. 2008: 1-7. |
[64] | HE W , LIU X , NGUYEN H ,et al. A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]// ICDCS Workshops. 2009: 14-19. |
[65] | WANG T , QIN X , DING Y ,et al. Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J]. Wireless Personal Communications, 2019,8(1): 665-684. |
[66] | HASAN ?AM , SUAT ?ZDEMIR , PRASHANT NAIR , et al ,et al. Energy-efficient secure pattern based data aggregation for wireless sensor networks[J]. Computer Communications, 2006,29(4): 446-455. |
[67] | ZHANG W , WANG C , FENG T . GP2S:Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data[C]// PerCom. 2008: 179-184. |
[68] | WANG C , WANG G , ZHANG W ,et al. Reconciling privacy preservation and intrusion detection in sensory data aggregation[C]// INFOCOM. 2011: 336-340. |
[69] | 范永健, 陈红, 张晓莹 ,等. 无线传感器网络中隐私保护通用近似查询协议[J]. 计算机学报, 2014,37(4): 915-926. |
FAN YJ , CHEN H , ZHANG XY ,et al. Privacy-Preserving Generic Approximate Query in Wireless Sensor Networks[J]. Chinese Journal of Computers, 2014,37(4): 915-926 | |
[70] | SCHNEIER B P . Applied cryptography - protocols,algorithms,and source code in C[M]. 2nd ed,New Jersey: Wiley, 1996. |
[71] | CONTI M , ZHANG L , ROY S ,et al. Privacy-preserving robust data aggregation in wireless sensor networks[J]. Security and Communication Networks, 2009,2(2): 195-213. |
[72] | CHOI H , ZHU S , PORTA T F L . SET:Detecting node clones in sensor networks[C]// SecureComm. 2007: 341-350. |
[73] | ZHANG X , CHEN H , WANG K ,et al. Rotation-based privacy-preserving data aggregation in wireless sensor networks[C]// ICC, 2014: 4184-4189. |
[74] | RAGHUNATHAN B . The complete book of data anonymization:from planning to implementation[M]. Florida: CRC PressPress, 2013. |
[75] | GROAT M M , HE W , FORREST S . KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]// INFOCOM. 2011: 2024-2032. |
[76] | WU D , YANG B , WANG H ,et al. Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks[J]. TOMCCAP, 2016,12(4s): 60:1-60:19. |
[77] | CHENG J , YANG H , WONG S H Y ,et al. Design and implementation of cross-domain cooperative firewall[J]. ICNP, 2007: 284-293. |
[78] | LIU A X , CHEN F . Collaborative enforcement of firewall policies in virtual private networks[C]// PODC. 2008: 95-104. |
[79] | YAO Y , XIONG X , PARK Y H ,et al. Privacy-preserving max/min query in two-tiered wireless sensor networks[J]. Computers & Mathematics with Applications, 2013,65(9): 1318-1325. |
[80] | KUMAR V , MADRIA S . PIP:privacy and integrity preserving data aggregation in wireless sensor networks[C]// SRDS. 2013: 10-19. |
[81] | PARAKH A , KAK S . Recursive secret sharing for distributed storage and information hiding[C]// ANTS. 2009: 1-3. |
[82] | OZDEMIR S , PENG M , XIAO Y . PRDA:polynomial regression-based privacy-preserving data aggregation for wireless sensor network[J]. Communications and Mobile Computing, 2015,15(4):(2015) 615-628. |
[83] | DAI H , YANG G , QIN X . EMQP:An energy-efficient privacy-preserving MAX/MIN query processing in tiered wireless sensor networks[J]. IJDSN, 2013 |
[84] | LIN H Y , TZENG W G . An efficient solution to the millionaires' problem based on homomorphic encryption[C]// ACNS. 2005: 456-466. |
[85] | DAI H , WEI T , HUANG Y ,et al. Random secure comparator selection based privacy-preserving max/min query processing in two-tiered sensor networks[J]. Sensors, 2016: 6301404:1-6301404:13. |
[86] | ALGHAMDI W Y , WU H , KANHERE S S . Reliable and secure end-to-end data aggregation using secret sharing in WSNs[C]// IEEE Wireless Communications and Networking Conference. 2017: 1-6. |
[87] | MAHIMKAR A , RAPPAPORT T S . SecureDAV:a secure data aggregation and verification protocol for sensor networks[C]// GLOBECOM. 2004: 2175-2179. |
[88] | YU L , LI J , CHENG S ,et al. Secure continuous aggregation via sampling-based verification in wireless sensor networks[C]// INFOCOM. 2011: 1763-1771. |
[89] | YU L , LI J , CHENG S ,et al. Secure continuous aggregation in wireless sensor networks[J]. IEEE Trans.Parallel Distrib.Syst., 2014,25(3): 762-774. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 金彪, 李逸康, 姚志强, 陈瑜霖, 熊金波. GenFedRL:面向深度强化学习智能体的通用联邦强化学习框架[J]. 通信学报, 2023, 44(6): 183-197. |
[3] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[4] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[5] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[6] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[7] | 赵越, 李赞, 李冰, 郝本建. TDoA定位盲区分析与节点部署策略研究[J]. 通信学报, 2023, 44(1): 1-13. |
[8] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[9] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[10] | 王振宇, 郭阳, 李少青, 侯申, 邓丁. 面向轻量级物联网设备的高效匿名身份认证协议设计[J]. 通信学报, 2022, 43(7): 49-61. |
[11] | 廖海君, 贾泽晗, 周振宇, 刘念, 王飞, 甘忠, 姚贤炯. 面向调控信息新鲜度保障的电力至简物联网资源优化[J]. 通信学报, 2022, 43(7): 203-214. |
[12] | 杨小东, 田甜, 王嘉琪, 李梅娟, 王彩芬. 基于云边协同的无证书多用户多关键字密文检索方案[J]. 通信学报, 2022, 43(5): 144-154. |
[13] | 李翠然, 王雪洁, 谢健骊, 吕安琪. 基于改进PSO的铁路监测线性无线传感器网络路由算法[J]. 通信学报, 2022, 43(5): 155-165. |
[14] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[15] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|