Font Size: a A A

Research On The Technologies Of Secure Data Aggregation In Internet Of Things

Posted on:2016-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:L K WangFull Text:PDF
GTID:2308330503976558Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile computation and manufacturing capability, the capability of storage and computation of mobile and embedded terminal will be stronger and stronger. The relevant safety protocol and algorithm in the IOT(Internet of Things) becomes the focus in the field of current research.Wireless sensor network is a major component of IOT, the main task of which is to gather useful informationrely on a large number of dispersed nodes in the environment enabling people to access and use this information for analysis and processing.Due to the limited power and data-centric features, data aggregation technology is widely used in wireless sensor networks.However, the data secrurity of wireless sensor networks has become a hot issue in data aggregation.This thesis focused on the study of key technologies of secure data aggregation in IOT, aims to design a suitable secure data aggregation scheme for application to the sensory level of the IOT. Meanwhile, a basic nework platform is built for experimental simulation and verification. The main contents and results are as follows:(1) The security features of wireless sensor networks and the capability of sensor nodes are analyzed to find out the basic requirements of secure data aggregation in the sensory level of intelligence IOT. They areprivacy, energy saving androbustness. In addition, existed internal and abroad secure data aggregation schemes are analyzed and compared to point out the research direction of secure data aggregation suitable for IOT.(2) The secure data aggregation scheme CMT based on additive homomorphic encryption has small amount of computing, simple structure and many other advantages, but could not overcome the giant overhead problem which caused by the expansion of nodes’ID. To solve this problem, the thesis proposes a secure data aggregation scheme based on key vector sharing, which transmits key information vector instead of nodes’ID to provide security protection under the premise of saving transmission overhead. At the same time, though adding combined hash value verification, the data aggregation’s integrity is guaranteed, which further improves the security. Acordding to the results of performance comparison, the propostioned scheme has lower transmtion overhead, overcomes the security flaws of the existed schemes. As a result, it is suitable for the wireless sensor network.(3) In order to meet the diversity requirements of data aggregation, the thesis also studied the MAX\MIN data aggregation scheme based on secret information bits hidden. The KIPDA scheme based on hiding secret information bits can provide nolinear prevacy protected data aggregation by adding camouflage data without using encryption. The scheme could be introduced in wireless sensor network to achieve secure MAX/MIN data aggregation. As the sheme lacks of integrity verification, it is vulnerable. To solve this problem, a double verification data aggregation schemewith camouflage datais proposed, which significantly improved the security.(4) Based on the proposed secure data aggregation scheme in wireless sensor network, we build a basic multi-node encryption data aggregation and query platform. Where each node is an ARMembedded system which does the data collection and encryption computing. They use zigbee module to communicate with each other. The storage terminal answers query requirements through establishment of a multi-threaded web server. Based on the simulation and analysis, the platform is suitable for the secure data aggretion of wireless sensor network.
Keywords/Search Tags:Internet of Things, Wireless Sensor Network, Secure Data Aggregation, Transmission Overhead, Integrity Verification
PDF Full Text Request
Related items