Font Size: a A A

Research On Secure Data Aggregation In Industrial Wireless Networks

Posted on:2020-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:D LuoFull Text:PDF
GTID:2428330590971798Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
The application of industrial wireless networks is mainly about the collection of information.Compared with wireless sensor networks,the industrial wireless networks has higher requirements for reliability and real-time performance.Data aggregation is an important method to alleviate the bottleneck of industrial wireless network resources.Distributed information aggregation process enables smaller amount of data transmission in the network,so information collection becomes more efficient and the life cycle of the network is extended accordingly.However,the application of data aggregation has also revealed many security issues.Therefore,to ensure the security of data in the aggregation process and transmission,it's necessary to study the secure data aggregation mechanism applicable to industrial wireless networks.Based on the analysis of data aggregation and security,this thesis proposes an endto-end secure data aggregation scheme.By setting up an experimental platform,the scheme is tested and verified.The main work of the thesis is as follows:1.Based on secure pseudorandom function,a aggregation data security construction method is designed to deal with the problem of data confidentiality of aggregation process.The sensor node uses the key and random number shared by the sink as the input of the secure pseudorandom function.With the output of disturbing data added to the original sampled data,the confidentiality of the data becomes possible.At the same time,in the process of intermediate aggregation,the cluster head does not need to decrypt the data of the node but directly aggregates the ciphertext,thereby the aggregation will be faster.It is unnecessary to worry that the data of the node will be leaked by the cluster head during the intermediate aggregation process.In other words,the confidentiality of the data of the aggregation process is guaranteed.2.As to the end-to-end integrity check problem of aggregated data,by constructing a homomorphic message authentication code that satisfies the additive homomorphism property,the generated homomorphic label can perform the same addition and aggregation operation as the data,and compare the aggregation value of homomorphic label.The sink can find out whether the cluster head has tampered the aggregation data so as to ensure the end-to-end integrity of the aggregated data.3.The theoretical analysis shows that the communication overhead of this scheme is lower than that of SDAMA,the same type of secure data aggregation scheme.Using the existing industrial wireless network WIA-PA platform in the laboratory,the correctness and security of the scheme are tested and verified.At the same time,the storage cost of the scheme is tested and analyzed.The additional storage cost of the scheme is only 1.31 KB,which is suitable for resource-constrained industrial wireless networks.
Keywords/Search Tags:industrial wireless networks, secure data aggregation, secure pseudorandom function, homomorphic message authentication code
PDF Full Text Request
Related items