Font Size: a A A

Privacy-Preserving Dynamic Integrity-Verification Algorithm In Data Aggregation

Posted on:2014-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2248330395984018Subject:Information security
Abstract/Summary:PDF Full Text Request
With the wireless sensor networks applied to the areas of daily life, the privacy of sensordata becomes a troublesome issue. If the data do not have adequate privacy protection, even if thedata is encrypted, the adversary can access to the sensitive information. Meanwhile, due to thesensor data transmitted in the open environment, the node can be compromised and eavesdroppedeasily. If the attacker cracks the wireless link, the data will be exposed. Wireless sensor networkdata fusion privacy protection is technology to ensure the correction of data fusion results andprevent the privacy data from exposing, even if the transmitted data is captured.However, some compromised sensor nodes in wireless sensor network may maliciouslymodify or process data with characteristics of hidden data. Therefore, it is necessary for thesensor node to verify the integrity of received data. The technology of integrity verification candetect the malicious modification without knowing the actual content of the sensor data.To detect any malicious data tampering and protect data privacy in data aggregation, a novelPrivacy-preserving dynamic Integrity-verification algorithm(PDI) was proposed. The PDIalgorithm uses the data perturbation to protect data privacy. In order to protect the integrity ofprivacy data, the PDI algorithm generates monitoring nodes between the current aggregator andits parent node depending on the network structure dynamically. Therefore, if the data is tamperedby the aggregator, it can be detected at the early stage. The simulation results show that, the PDIalgorithm can realize privacy preserving and integrity verification with less communication andcomputation overhead.
Keywords/Search Tags:Wireless sensor networks, Data aggregation, Privacy preserving, Integrityverification, Data perturbation
PDF Full Text Request
Related items