Font Size: a A A

Research On Secure Data Aggregation Scheme In Wireless Sensor Networks

Posted on:2015-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:W W YangFull Text:PDF
GTID:2348330518471681Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network is resource-constrained, distributed, self-organizing, multi-hop,data-centric network, the characteristics of low cost and high flexibility make it widely used in military reconnaissance, environmental monitoring, health care, traffic control and other fields. Data aggregation mechanism is used in wireless sensor network to reduce energy consumption and network collisions, but it also brings new security threats. An attacker can forge, replay, tamper and discard data of normal sensor nodes, but also may compromise higher level aggregation nodes to obtain, change or discard the fusion result, thus leads to disastrous consequences.The paper has studied the deficiencies of the existing achievements,and designed improved secure data aggregation schemes from confidentiality and integrity respectively.Using slicing and mixing technology, supervision and reputation mechanism, the schemes achieved the required safety data aggregation targets ultimately. Specific work of this paper includes the following three aspects:Firstly, the paper proposes a lightweight privacy protection program, which applies private seed and slice technology in cluster to protect data privacy, uses random probability to decide the maximum number of slice in each cluster and slice number for each node in a certain cluster, thus reducing communication and computation cost and improving the accuracy of aggregation results. Under the premise of guarantee privacy effectively, the scheme has less computation and communication cost, and higher integration precision than CPDA.Secondly, a secure and efficient data aggregation scheme is proposed, which is based on Dual-head Cluster Based Secure Aggregation (DCSA). By setting symmetric key between nodes, and using distributed authentication method, where node authentication and aggregation simultaneously, integrity-checking of child node is finished immediately in the process of aggregation. Also, by using the oversight features of red and black cluster head,this scheme can locate malicious nodes and enhance the anti-collusion attack capability. The scheme ensures the same level of security with DCSA, and is able to detect and discard erroneous data as soon as possible,it improves the efficiency of integrity detection mechanism and has lower network energy consumption.Lastly, the paper demonstrates efficiency and reliability of the two secure data aggregation algorithms by theoretical analysis, and confirms the feasibility of secure data integration solutions through experimental simulation.
Keywords/Search Tags:wireless sensor network, data aggregation, privacy protection, data integrity
PDF Full Text Request
Related items