Font Size: a A A

Research And Optimization Of Data Aggregation Based On Authentication And Encryption

Posted on:2022-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:J GengFull Text:PDF
GTID:2518306494471224Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of collection equipment connected to the Internet of Things,data security has become more important.The sensor node located at the original location of the sensing data is often at the risk of various attacks,because it not only is a data source but also has limited computing power and shortage of energy.Data aggregation,as a way to effectively improve existing problems,can reduce the cost of wireless sensor network transmission energy while trying to ensure network security,which is a method of optimizing network performance.The main research contents of this paper are as follows:A method for collaborative encryption and aggregation of multiple data is designed.First,through the analysis of the privacy protection data aggregation schemes,the shortcomings of the existing methods of concentrating aggregation on cluster heads are found,and based on the characteristics of sensors that can sense multiple types of data at the same time,an improved algorithm is proposed.Its advantage is that it can encrypt n kinds of heterogeneous data by running the encryption algorithm once,which saves node energy consumption.Finally,the security performance of the algorithm is analyzed,and the effectiveness of the algorithm is verified through simulation.The results show that the algorithm has better performance in energy consumption and network life cycle compared with the related existing algorithms.A multi-level clustering secure aggregation protocol is designed.Based on the analysis of data aggregation routing strategy,a multi-level clustering model for outdoor applications is proposed to optimize the network partition model and the node classification strategy.In addition,security strategy are added to the protocol,the nodes with high security index are selected as cluster heads to reduce the impact of black hole attack,selective forwarding attack and wormhole attack.The security of the protocol is proved by security analysis.Finally,the simulation results show that the multi-level clustering secure aggregation protocol has better performance in the number of dead nodes per round and the average residual energy of nodes than the existing typical protocols and implementation algorithms.The protocol considers both lifetime and security of the edge nodes of the Internet of things and achieves good results.
Keywords/Search Tags:data aggregation, privacy protection, aggregation signature, identity authentication, WSNs
PDF Full Text Request
Related items