Font Size: a A A

The Research Of Secure Data Aggregation In Wireless Sensor Networks

Posted on:2012-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:H J LiFull Text:PDF
GTID:2178330335954423Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, wireless sensor networks (WSNs) are widely deployed in the military surveillance, civilian usage and other applications. They totally change the way of people communicating with the nature, also improve people's ability of perceiving the outside world. The technology of wireless sensor network has been thought as one of the 21 most influential technologies and one of the ten ways that would change the world in 21st century.When the wireless sensor networks has been widely applied in different aspects of people's lives, the security in wireless sensor networks has caused more and more attention. This is because the security is associated with the expansion and popularity of the WSNs. At the same time, wireless sensor networks have their unique characteristics, like resource-limited, large scale, high density and also without tamper-resistant hardware. To adapt to these characteristics, people proposed data aggregation, which can effectively reduce the communication overhead and energy consumption. Then the security of data aggregation in wireless sensor networks is widely studied to make sure that the privacy and integrity of sensory data are protected.Based on the previous work about security of data aggregation, this paper proposed two schemes to address the privacy and integrity protection:Energy-Efficient and High-Accuracy secure data aggregation (EEHA for short) and secure data aggregation with Malicious Aggregator Identification (MAI for short).EEHA aims to protect data privacy through "slicing and assembling" technique. It also takes advantage of the aggregation property of losing original data. Then all the transmitted data are processed data not original sensory data. In this way, the original data of each node only known to the node itself, all the other nodes and also the outside attacker can never get the original value. Besides, our proposed scheme have improved the accuracy of final aggregation result, and reduced the communication overhead and energy consumption.MAI scheme can not only make sure that the base station will never accept a false aggregation result that has been tampered, but also identify the malicious aggregators that tampered the intermediate result. Then the malicious aggregators can be excluded from network and their negative influence can be eliminated. We also considered the energy constraint. We minimize the communication overhead and energy consumption as low as possible while realizing the above security protection. This can effectively help to extend the network life span.
Keywords/Search Tags:Wireless Sensor Networks, Data Aggregation, Privacy, Integrity
PDF Full Text Request
Related items