通信学报 ›› 2015, Vol. 36 ›› Issue (2): 56-67.doi: 10.11959/j.issn.1000-436x.2015034
李睿1,李晋国2,陈浩1
出版日期:
2015-02-25
发布日期:
2017-06-27
基金资助:
Rui LI1,Jin-guo LI2,Hao CHEN1
Online:
2015-02-25
Published:
2017-06-27
Supported by:
摘要:
提出了一种安全分类协议SSC,该协议在保护待分类数据和分类规则隐私的情况下使存储节点进行正确分类,并且 sink 节点可以对分类结果进行抽样认证,防止妥协存储节点伪造分类结果。提出了一种不经意比较(oblivious comparison)技术MHash,该技术首先将分类需要的大小比较转换成等值比较,并进一步采用模运算和散列技术实现隐私保护下的数据分类。提出了一种“十”字邻居技术,分别将传感器以及传感器采集的数据组织成链,并采用倒置布鲁姆过滤器技术同步传感器节点之间的数据,sink利用该技术可以抽样检查存储节点分类统计结果的正确性,分析和实验结果验证了所提方案的有效性。
李睿,李晋国,陈浩. 两层传感器网络中安全分类协议研究[J]. 通信学报, 2015, 36(2): 56-67.
Rui LI,Jin-guo LI,Hao CHEN. Safe and secure classification protocol in two-tiered sensor networks[J]. Journal on Communications, 2015, 36(2): 56-67.
表1
SSC协议中的算法复杂度分析"
节点名 | 计算复杂度 | 通信开销 | 空间复杂度 |
传感器 | O(m) Rule Processing O(n) Data Encryption O(n) IBF Construction O(d) IBF Data recovery | O(m) Rule O(n) Encrypted Data O(d)Data Synchroniz-ation | O(n) O(d) |
存储节点 | O(1) Rule Processing O(n) Data encryption and Classification | O(m) Classification Results | O(m) |
sink | O(m) Rule Processing | O(m) Rules | O(m) |
1 | 李建中, 李金宝, 石胜飞 . 传感器网络及其数据管理的概念、问题与进展[J]. 软件学报, 2003,14(10):1717-1727. LI J Z , LI J B , SHI S F . Concepts,issues and advance of sensor networks and data management of sensor networks[J]. Journal of Software, 2003,14(10):1717-1727. |
2 | 崔莉, 鞠海玲, 苗勇 等. 无线传感器网络研究进展[J]. 计算机研究与发展, 2005,42(1):163-174. CUI L , JU HL , MIAO Y , et al. Overview of wireless sensor network[J]. Computer Research and Development, 2005,42(1):163-174. |
3 | 唐勇, 周明天, 张欣 . 无线传感器网络路由协议研究进展[J]. 软件学报, 2006,17(3):422-433. TANG Y , ZHOU M T , ZHANG X . Overview of routing protocols in wireless sensor networks[J]. Journal of Software, 2006,17(3):410-421. |
4 | HU W , TRAN V N , BULUSU N , et al. Design and evaluation of a hybrid sensor network for cane-toad monitoring[J]. ACM Transactions on Sensor Networks, 2009,5(1):1-28. |
5 | DESNOYERS P , GANESAN D , LI H , et al. PRESTO:a predictive storage architecture for sensor networks[A]. Proceeding of Workshop on Hot Topics in Operating Systems (HotOS’05)[C]. Berkeley,CA:USENIX Association, 2005. |
6 | RATNASAMY S L , KARP B , SHENKER S , et al. Data-centric storage in sensor nets with ght,a geographic hash table[J]. Mobile Networks and Applications, 2003,4(8):427-442. |
7 | Intel lab data[EB/OL]. . |
8 | WANG Q , CHEN W , ZHENG R , et al. Acoustic target tracking using tiny wireless sensor devices[A]. Proc of 2nd Intl Conf on Information Processing in Sensor Networks[C]. Palo Alto,CA, 2003.642-657. |
9 | HE T , KRISHNAMURTHY S , STANKOVIC J A , et al. An energy-efficient surveillance system using wireless sensor networks[A]. Proc of Intl Conf on Mobile Systems,Applications,and Services[C]. Boston,MA, 2004.270-283. |
10 | BROOKS R R , SAYEED A M . Distributed target classification and tracking in sensor networks[J]. Proceedings of the IEEE, 2003,91(8):1163-1171. |
11 | GU L , JIA D , VICAIRE P , et al. Lightweight detection and classification for wireless sensor networks in realistic environments[A]. Third ACM Conference on Embedded Networked Sensor Systems[C]. New York:ACM Press, 2005.205-217. |
12 | HUANG Q , XING T , LIU H . Vehicle classification in wireless sensor networks based on rough neural networks[A]. Proceedings of the 2nd IASTED International Conference on Advances in Computer Science and Technology[C]. Anaheim:ACTA Press, 2006.141-144. |
13 | PAI H , HAN Y , SUNG J . Two-dimensional coded classification schemes in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2008,7(5):1450-1455. |
14 | KULAKOV A , DAVCEV D , TRAJKOVSKI G . Implementing artificial neural-networks in wireless sensor networks[A]. Proceedings of IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications[C]. Piscataway:IEEE, 2005.94-97. |
15 | ZHAO F , LIU J , GUIBAS L , et al. Collaborative signal and information processing:an information directed approach[A]. Proceedings of the IEEE,Piscataway[C]. 2003,91(8):1199-1209. |
16 | PATTEM S , PODURI S , KRISHNAMACHARI B . Energy-quality tradeoffs for target tracking in wireless sensor networks[A]. Proc of 2nd Intl Conf on Information Processing in Sensor Networks[C]. Berlin:Springer-Verlag, 2003.32-46. |
17 | WANG H , ESTRIN D , GIROD L . Preprocessing in a tiered sensor network for habitat monitoring[J]. EURASIP Journal on Applied Signal Processing, 2003,4(4):392-401. |
18 | SHENG B , LI Q . Verifiable privacy-preserving sensor network storage for range query[J]. IEEE Transaction on Mobile Computing, 2011,10(9):1312-1326. |
19 | SHI J , ZHANG R , ZHANG Y . A spatiotemporal approach to secure range queries in tiered sensor networks[J]. IEEE Transactions on Wireless Communications, 2011,10(1):264-273. |
20 | ZHANG R , SHI J , ZHANG Y , et al. Secure cooperative data storage and query processing in unattended tiered sensor networks[J]. IEEE Journal on Selected Areas in Communications,Special Issue on Cooperative Networking Challenges and Applications, 2012,30(2):433-441. |
21 | HACIGUMUS H , IYER B , LI C , et al. Executing sql over encrypted data in the database-service-provider model[A]. Proc ACM Inte Conf on Management of Data (SIGMOD2002)[C]. 2002.216-227. |
22 | HORE B , MEHROTRA S , TSUDIK G . A privacy-preserving index for range queries[A]. Proc 30th Inte Conf on Very Large Data (VLDB2004)[C]. New Orleans,LA,USA, 2004.720-731. |
23 | CHEN F , LIU A X . Privacy and integrity preserving range queries in sensor networks[J]. IEEE/ACM Transactions on Networking, 2012,20(6):1774-1787. |
24 | YI Y Q , LI R , CHEN F , et al. A digital watermarking approach to secure and precise range query processing in sensor networks[A]. Proceedings of the IEEE Conference on Computer Communications 2013 (INFOCOM2013)[C]. Turin,Italy, 2013. |
25 | ZHANG R , SHI J , LIU Y Z , et al. Verifiable fine-grained top-k queries in tiered sensor networks[A]. Proceeding of IEEE International Conference on Computer Communications (INFOCOM 2010)[C]. Piscataway,NJ:IEEE, 2010.1199-1207. |
26 | 范永健, 陈红 . 两层传感器网络中可验证隐私保护的 top-k 查询协议[J]. 计算机学报, 2012,35(3):423-433. FAN Y J , CHEN H . Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks[J]. Chinese Journal of Computers, 2012,35(3):423-433. |
27 | 李睿, 林亚平, 易叶青 等. 两层传感器网络中安全 top-k查询协议[J]. 计算机研究与发展, 2012,49(9):1947-1958. LI R , LIN YP , YI Y Q , et al. A secure top-k query protocol in two-tiered sensor networks[J]. Computer Research and Development, 2012,49(9):1947-1958. |
28 | 廖小静, 李建中, 余磊 . 一种能量有效的双层传感器网络安全top-k查询机制[J]. 计算机研究与发展, 2013,50(3):490-497. LIAO X J , LI J Z , YU L . Secure and efficient top-k query processing in two-tier sensor network[J]. Computer Research and Development, 2013,50(3):490-497. |
29 | 李睿, 林亚平, 李晋国 . 两层传感器网络中一种高效的加密数据条件聚合协议研究[J]. 通信学报, 2012,33(12):58-68. LI R , LIN Y P , LI J G . Efficient conditional aggregation of encrypted data in tiered sensor networks[J]. Journal on Communications, 2012,33(12):58-68. |
30 | CHAN H , PERRIG A , SONG D . Secure hierarchical in-network aggregation in sensor networks[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. New York:ACM Press, 2006.278-287. |
31 | YANG Y , WANG X , ZHU S , et al. Sdap:a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information and System Security, 2008,11(4):1-43. |
32 | YAO Y Y , XIONG N , PARK J , et al. Privacy-preserving max/min query in two-tiered wireless sensor networks[J]. Computer and Mathematics with Application, 2012,2:1-8. |
33 | AGRAWAL R , EVFIMIEVSKI A , SRIKANT R . Information sharing across private databases[A]. Proceedings of the 2003 ACM SIGMOD International Conference on Management of data[C]. New York:ACM Press, 2003.86-97. |
34 | BAWA M , BAYARDO R R . Privacy-preserving indexing of documents on the network[A]. Proceedings of the 29th International Conference on Very Large Data Bases[C]. Berlin:VLDB Endowment, 2003.922-933. |
35 | HORE B , MEHROTRA S , TSUDIK G . A privacy-preserving index for range queries[A]. Proceedings of the 30th International Conference on Very Large Data Bases[C]. Toronto:VLDB Endowment, 2004.720-731. |
36 | CHENG J , YANG H , WONG S et al. Design and implementation of cross-domain cooperative firewall[A]. IEEE International Conference of Network Protocol Piscataway IEEE[C]. New Orleans,LA,USA, 2007.284-293. |
37 | CHENG J , YANG H , WONG S H , et al. Design and implementation of cross-domain cooperative firewall[A]. Proc International Conference on Network Protocols[C]. Piscataway:IEEE, 2007.284-293. |
38 | LIU A X , CHEN F . Collaborative enforcement of firewall policies in virtual private networks[A]. Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing[C]. New York:ACM Press, 2008.95-104. |
39 | CHANG Y K . Fast binary and multiway prefix searches for packet forwarding[J]. Computer Networks, 2007,51(3):588-605. |
40 | HU Y P , LI R , ZHOU S W , et al. CCS-MAC:Exploiting the overheard data for compression in wireless sensor networks[J]. Computer Communication, 2011,34:1696-1707. |
41 | EPPSTEIN D , GOODRICH M T , UYEDA F , et al. What’s the difference? efficient set reconciliation without prior context[A]. ACM SIGCOMM Computer Communication Review[C]. New York:ACM Press, 2011.218-229. |
42 | XIAO S , GONG W , TOWSLEY D . Secure wireless communication with dynamic secrets[A]. Proc IEEE Inte Conf on Computer Communications,Piscataway:IEEE[C]. New Orleans,LA,USA, 2010.1-9. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[3] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[4] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[5] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[6] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[7] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[8] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[9] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[10] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[11] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
[12] | 史瑞, 封化民, 谢惠琴, 史国振, 刘飚, 杨旸. 基于带智能卡的移动终端实现的隐私保护的属性票据方案[J]. 通信学报, 2022, 43(10): 26-41. |
[13] | 熊金波, 周永洁, 毕仁万, 万良, 田有亮. 边缘协同的轻量级隐私保护分类框架[J]. 通信学报, 2022, 43(1): 127-137. |
[14] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
[15] | 马立川, 彭佳怡, 裴庆祺, 朱浩瑾. 高效的决策树隐私分类服务协议[J]. 通信学报, 2021, 42(8): 80-89. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|