Font Size: a A A

Research On Multi-application Secure Data Aggregation In Wireless Sensor Networks

Posted on:2022-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:W S MaFull Text:PDF
GTID:2518306323485794Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development of wireless communication and microelectronics technology,Wireless Sensor Networks(WSNs)have been widely used in many fields,such as everyday life,military and other areas of industry and agriculture.However,the nodes in WSNs are usually deployed in unattended or even hostile environments.Meanwhile,these nodes are equipped with limited battery,storage,computation and communication resources.Therefore,it is a challenge to ensure the security of WSNs without reducing network performance.Data aggregation with secure mechanism can provide a good scheme to solve the aforementioned problems.Especially,the Secure Data Aggregation(SDA)scheme based on privacy homomorphic encryption algorithm has become a research hotspot because of its high security.In this paper,a SDA technology based on elliptic curve encryption and secret sharing algorithm in heterogeneous WSNs is taken into consideration.Three aspects including network topology,data encryption and data aggregation,are discussed,which attempts to improve the performance of security in terms of the computation consumption,the communication consumption and aggregation accuracy.Firstly,a secure data aggregation algorithm in heterogeneous networks is studied so as to complete the secure aggregation of sensor nodes to aggragation heads.In a heterogeneous network,the multiple data nodes are deployed for different applications and the data collected by these nodes are also different(such as temperature sensor nodes,humidity sensor nodes,etc.).How to achieve safe and energy-saving aggregation of the information collected by these sensor nodes is the focus of our research.This scheme construct a network topology suitable for SDA.Through classifying and summarizing the network topology in current studies of WSNs,the cluster topology is used as the basic transmission model of the network,which makes the connection between nodes more reasonable and reduces the transmission of redundant data.The asymmetric elliptic curve homomorphic encryption algorithm is used as the basis of the encryption algorithm.The cluster head node generates a public key and a private key.The private key is stored by the base station.Sensor nodes of different application types use different public keys for encryption,Different types of encrypted data can still be aggregated to achieve lower communication volume,thereby reducing the consumption of node resources.In addition,in the process of data transmission,the homomorphic message authentication code technology is used to protect the integrity of the data.Secondly,an improved secret sharing scheme is studied to protect the secure data transmission from cluster head nodes to base stations.In a cluster,the cluster head is responsible for aggregating and forwarding the information of all members in a cluster.Therefore,the security of the cluster head node is particularly important.According to the Shamir secret sharing algorithm,the information of the cluster head node is calculated and then fragmented.Fragmentation information and random numbers are fitted to a polynomial to generate multiple encrypted data pieces.The information pieces of the cluster head node are forwarded by neighbor nodes to the base station to protect the security of the cluster head node data in a multi-point cooperative manner.The base station only needs to receive a certain number of data fragments to recover the original data.The data pieces are combined and calculated,and the calculated results are mutually verified to improve the accuracy of the data.
Keywords/Search Tags:Wireless sensor networks, Secure data aggregation, Privacy homomorphic encryption, Data slicing
PDF Full Text Request
Related items