Font Size: a A A

Research On Data Encryption Mechanism Supporting Outsourced Attribute-Based Encryption For Wireless Sensor Networks

Posted on:2018-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:X F FangFull Text:PDF
GTID:2348330536983309Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet and wireless technology,wireless sensor networks are widely used in various fields.However,the security problems in the wireless sensor network have become the key factors that restrict its further application and development.The data protection is the most basic security problem in wireless sensor networks.Attribute-based encryption is a new public key encryption mechanism based on the fuzzy identity encryption mechanism.It can not only protect the data,but also realize the fine-grained access control.However,the computational cost of attribute-based encryption and decryption is higher,especially the computational cost of encryption and decryption will increase with the complexity of access policies.The sensor's electricity,storage space and computing power are very limited,and can't afford much too high calculation cost.Therefore,it is great theoretical and research value to study how to reduce the encryption and decryption cost of the sensor and make attribute-based encryption more suitable for the wireless sensor network environment.This paper studies how to use the attribute-based encryption to construct the data encryption mechanism in the wireless sensor network environment.The main work is as follows:This paper analyzes their scheme of Zhou et al.,and points out that the scheme still needs to perform a linear pair calculation and multiple exponential calculations in the local sensor encryption stage,and does not realize the user revocation.In response to these problems,an outsourcing encryption and decryption scheme is proposed with revoking illegal user.The proposed scheme makes the encryption calculation of the sensor just need a simple XOR operation,the heavy computations of the attribute-based encryption and decryption are outsourced to the cloud server,thus reducing the encryption and decryption cost of the local sensor and realizing the safe transmission and fine-grained access control.In addition,the proposed scheme achieves the revocation of an illegal user.When a user is revoked,the legitimate user does not need to update the key.Under on the generic bilinear group model,the security of proposed scheme is proved.The proposed scheme has lower computational cost in the decryption and decryption phase than the scheme of Zhou et al.This paper analyzes their scheme of Hu et al.,and points out that there is a high cost of sensor encryption calculation and high bandwidth transmission cost in data sink node.In response to these problems,an encryption scheme that supports outsourcing attribute-based encryption and data aggregation is proposed.The proposed scheme utilizes the outsourcing attribute-based encryption to reduce the encryption cost of the sensor,and uses the aggregation technology to realize the data transmission after aggregation,thus reducing the transmission cost.The experimental results show that the proposed scheme has lower encryption cost and communication cost at the sensor node.Based on the encryption scheme that supports outsourcing attribute-based encryption and data aggregation,a simulation prototype system is constructed using JAVA language and Java Pairing Based Cryptography Library(JPBC)library,which proves the correctness and feasibility of the proposed scheme.
Keywords/Search Tags:wireless sensor network, attribute-based encryption, outsourcing encryption, data aggregation, user revocation
PDF Full Text Request
Related items