Font Size: a A A

Research On User Privacy Protection Scheme In Wireless Sensor Networks

Posted on:2019-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:H T YuFull Text:PDF
GTID:2428330566466988Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The application of wireless sensor networks has deepened into every corner of people's life and work.With the people's understanding of the application deeply,there are many applications of wireless sensor networks expose the situation that the protection of users' privacy data is not effectively protected.In this paper focuses on solving the privacy data inside the wireless sensor network.The main research achievement of this article is as follows.1)From the basic encryption algorithm,the characteristics of three typical encryption unkeyed encryption algorithms,symmetric encryption algorithms and public key encryption algorithms are analyzed.At the same time,three types of identity authentication schemes are analyzed,which are based on symmetric encryption algorithm,public key encryption algorithm and hybrid identity authentication scheme.2)We have analyzed the identity authentication scheme put forward by a scholar in recent years,and found that this scheme cannot resist the hacker attacks that have been discovered.To address the problems,a secure performance enhanced identity authentication scheme has been proposed.The security of the proposed authentication scheme using BAN logic and informal analysis,and give the corresponding execution efficiency analysis.Experimental results show that our scheme can work efficiently and safely in wireless sensor network environment.3)From the point of view of the system privacy data protection,we propose a data protection scheme for the image data in the intelligent medical system,which can be searched for the encrypted image.In this scheme,the Local Sensitives Hash function(LSH)is used to construct the retrieval index.The AES encryption algorithm is encrypted to the original image.Using the basic principle of ECC,the index is encrypted and the trap door is constructed.In security analysis,the confidentiality of image data,the confidentiality of index data and the security of trapdoor are discussed in detail.The results of security analysis show that our scheme can retrieve users' similar images safely in cipher-text context.The retrieval complexity of retrieval efficiency is lower than that of linear complexity.
Keywords/Search Tags:Wireless Sensor Networks, Authentication scheme, searchable encryption image retrieval, ECC
PDF Full Text Request
Related items