Font Size: a A A

Research On Security Data Aggregation Technology For Confidentiality And Integrity Protection

Posted on:2019-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2428330578468174Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network(WSN)data aggregation technology as an emerging technology for data processing has been amazingly developed in the past 10 years.Data aggregation technology is not only widely used in the military field but also has broad application prospects in the field of automated manufacturing commercial departments and even families.Data aggregation is a process that reduces communication overhead in wireless sensor networks.At present protection data aggregation is an important research topic in wireless sensor networks.In the real world sensor nodes deployed in sensitive and open environments can easily become the target of attackers.The leakage of converged data can cause network damage and cannot be retrieved in a short time.Most traditional encryption algorithms provide security for data aggregation but they do not reduce power consumption.Today homomorphic encryption systems are widely used to provide low-energy security such as merging ciphertext but not decrypting at the cluster head.For the data aggregation security problem in wireless sensor networks this paper mainly studies from two aspects First to protect the end-to-end integrity of data to ensure that the data in the network is not maliciously tampering during transmission or integration.The second is to protect the end-to-end confidentiality of the data to ensure that the perceived data of any node in the network is not acquired by other nodes during the transmission.We not only consider data aggregation security issues but also meet a variety of query results.The main contributions of this paper are as follows(1)Based on the existing data aggregation scheme this paper proposes a data aggregation algorithm that can protect data integrity and recover perceived data for data confidentiality and integrity.This algorithm is based on the idea of data fragmentation which combines the original data to ensure the confidentiality of the data and combines the aggregation and signature techniques to ensure that the fusion node fuses the data without knowing the plaintext.The base station authenticates thefused data and recovers the original data from the fused data.Theoretical analysis and experimental results show that the signature fragmentation algorithm can ensure the data privacy while controlling the communication and computational overhead in the process of data processing and data aggregation.(2)Based on the comprehensive research on the advantages and disadvantages of other data aggregation algorithms it addresses the security and low energy consumption of most security data fusion technologies.This paper proposes a secure data aggregation algorithm(HSSDA)based on homomorphic encryption and signature aggregation.In this scheme the additive homomorphic encryption system of the Paillier algorithm is used to encrypt data and the signature aggregation algorithm of Boneh et al.is used to generate the signature of each sensor node.A new combination of encryption and signature methods provides confidentiality and integrity.Theoretical analysis and experimental results show that the HSSDA algorithm consumes less computation time and energy consumption than existing methods.
Keywords/Search Tags:wireless sensor network, data aggregation, data confidentiality, data integrity, homomorphic encryption
PDF Full Text Request
Related items