当前位置: X-MOL 学术Wirel. Commun. Mob. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS)
Wireless Communications and Mobile Computing Pub Date : 2021-07-09 , DOI: 10.1155/2021/8824220
D. Vinodha 1, 2 , E. A. Mary Anita 3
Affiliation  

In a wireless sensor network, data privacy with a minimum network bandwidth usage is addressed using homomorphic-based data aggregation schemes. Most of the schemes which ensure the end-to-end privacy provide collective integrity verification of aggregated data at the receiver end. The presence of corrupted values affects the integrity of the aggregated data and results in the rejection of the whole data by the base station (BS) thereby leading to the wastage of bandwidth and other resources of energy constraint wireless sensor network. In this paper, we propose a secured data aggregation scheme by slicing the data generated by each sensor node deployed in layered topology and enabling en route aggregation. Novel encoding of data and hash slices based on child order is proposed to enable concatenation-based additive aggregation and smooth extraction of slices from the aggregate by the BS. Elliptic curve-based homomorphic encryption is adopted to ensure end-to-end confidentiality. To the best of our knowledge, the proposed scheme is the first which facilitates the BS to perform node-wise integrity verification, filter out only the corrupted portion, and implement dynamic query over the received data. Communication- and computation-based performance analysis shows the efficiency of the proposed scheme for varied network sizes. The scheme can resist eavesdropping attack, node compromising attack, replay attack, malleability attack, selective dropping attack, and collusion attack.

中文翻译:

用于无线传感器网络(DIA-SSDAS)的基于切片的安全数据聚合方案的离散完整性保证

在无线传感器网络中,使用基于同态的数据聚合方案解决具有最小网络带宽使用的数据隐私问题。大多数确保端到端隐私的方案在接收端提供对聚合数据的集体完整性验证。损坏值的存在会影响聚合数据的完整性,并导致基站(BS)拒绝整个数据,从而导致带宽和其他能量受限无线传感器网络资源的浪费。在本文中,我们通过切片部署在分层拓扑中的每个传感器节点生成的数据并启用途中聚合来提出一种安全的数据聚合方案。提出了基于子顺序的数据和散列切片的新编码,以实现基于连接的附加聚合和 BS 从聚合中平滑提取切片。采用基于椭圆曲线的同态加密,保证端到端的机密性。据我们所知,所提出的方案是第一个促进 BS 执行节点完整性验证、仅过滤掉损坏的部分并对接收到的数据实施动态查询的方案。基于通信和计算的性能分析显示了所提出的方案对于不同网络规模的效率。该方案可以抵抗窃听攻击、节点妥协攻击、重放攻击、延展性攻击、选择性丢弃攻击和合谋攻击。采用基于椭圆曲线的同态加密,保证端到端的机密性。据我们所知,所提出的方案是第一个促进 BS 执行节点完整性验证、仅过滤掉损坏的部分并对接收到的数据实施动态查询的方案。基于通信和计算的性能分析显示了所提出的方案对于不同网络规模的效率。该方案可以抵抗窃听攻击、节点妥协攻击、重放攻击、延展性攻击、选择性丢弃攻击和合谋攻击。采用基于椭圆曲线的同态加密,保证端到端的机密性。据我们所知,所提出的方案是第一个促进 BS 执行节点完整性验证、仅过滤掉损坏的部分并对接收到的数据实施动态查询的方案。基于通信和计算的性能分析显示了所提出的方案对于不同网络规模的效率。该方案可以抵抗窃听攻击、节点妥协攻击、重放攻击、延展性攻击、选择性丢弃攻击和合谋攻击。并对接收到的数据进行动态查询。基于通信和计算的性能分析显示了所提出的方案对于不同网络规模的效率。该方案可以抵抗窃听攻击、节点妥协攻击、重放攻击、延展性攻击、选择性丢弃攻击和合谋攻击。并对接收到的数据进行动态查询。基于通信和计算的性能分析显示了所提出的方案对于不同网络规模的效率。该方案可以抵抗窃听攻击、节点妥协攻击、重放攻击、延展性攻击、选择性丢弃攻击和合谋攻击。
更新日期:2021-07-09
down
wechat
bug