Font Size: a A A

Research Of Secure Data Aggregation Protocol In Wireless Sensor Network

Posted on:2010-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:J WeiFull Text:PDF
GTID:2178360278973154Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks (WSN) integrate sensor technology, embedded computing technology and wireless communication technology. Because of their wide applications, wireless sensor networks were considered as one of the most important technologies in the 21st century. At the same time, the sensor's energy, storage and capacity were limited, so data aggregation technology based on wireless sensor networks caused a great concern.Data aggregation technique is a process that can combine multiple copies of data or information, which the combination is more effective and more in line with user needs, so it plays an important role in energy conservation in WSN. And the data aggregation technology reduces the amount of data transfer process, which greatly satisfies the users' various types of wireless sensor networks demand. However, because of the harsh environment and the vulnerability of sensor nodes, it makes the data aggregation facing the security challenges.In this paper we mainly study secure issues of data aggregation in WSN. We summarize the properties and safety requirements of the secure data aggregation protocols, based on the needs of WSN, by studying and analyzing various protocols, carries out a detailed overview of the field, and then propose a new secure data aggregation schemes.First, based on the characteristics of WSN, according to the significance of the data aggregation, this paper proposes secure data aggregation, analyzes and summaries security problems of data aggregation in wireless sensor network, and carries out a detailed classification.Secondly, this paper on the study of secure data aggregation, based on public key encryption system, proposes a data aggregation program, which is semantic safety, public key, doing mixed homomorphic aggregation in WSN. In WSN, the homomorphic aggregation for the protection of data confidentiality so far is the most favorable choice. In order to enable WSN better to meet the users' various needs, if there is a public key algorithm that can achieve mixed homomorphic encryption system, then we can use the homomorphism as much as possible and compute kinds of aggregation results to meet the needs of users for the wireless sensor network data monitoring requirements. Our study is based on this demand. In our scheme, it is able to achieve a mixed computing homomorphism with safety data aggregation, the user's data request of any polynomial can be obtained through our scheme. In addition, we compare our scheme with some other protocols and draws that our scheme is a leading of the field.Thirdly, in this paper, based on the scheme we proposed, after further analysis, we propose a new scheme again, which is forward secure, achieving mixed aggregation homomorphism. In order to protect the forward secret before the disclosure of the information in the sensor node, especially like the sensor nodes which is such a low-security equipment and easy to attack, and do data aggregation correctly, so we propose a forward secure data homomorphic aggregation which can do mixed operations, and give a rigorous proof of security.Finally, based on the on the rapid development of secure data aggregation protocols, we introduce the concept of Universally Composable (UC) Security into the field of secure data aggregation protocols. Moreover, we give a UC security model of data aggregation in WSN. Last, we give some future directions of data aggregation protocols combination in the wireless sensor networks.
Keywords/Search Tags:Wireless Sensor Network, Secure Data Aggregation, Mixed Homomorphic, Forward Secure, Universally Composable Security
PDF Full Text Request
Related items