当前位置:主页 > 科技论文 > 信息工程论文 >

无线传感器网络安全数据融合方案研究

发布时间:2018-07-20 10:31
【摘要】:无线传感器网络是资源受限、分布式、自组织、多跳、以数据为中心的网络,其低成本和高灵活性的优点使其广泛应用于军事侦查、环境监测、医疗健康、交通监控等领域。数据融合机制被应用于无线传感器网络中以减少能量消耗和网络碰撞,但同时也带来了新的安全威胁。攻击者不仅可以伪造、重放、篡改和丢弃普通传感器节点的数据,而且可能通过直接妥协更高级别的融合节点来获取、更改或者丢弃融合结果,导致灾难性的后果。论文针对现有研究成果的不足,分别从机密性和完整性两个方面设计改进的安全数据融合方案,采用切片重组技术和监督信誉机制,最终达到数据融合所需的安全目标。论文中所作的具体工作主要包括以下三个方面:首先,提出一种轻量级的隐私保护方案,应用私密种子和簇内切片技术实现隐私保护,采用随机概率决定每个簇的最大分片数和簇内每个节点的不同分片数,降低通信和计算代价,提高融合结果精确度。相比于CPDA算法,该方案在有效保证隐私的前提下,具有较少的计算和通信代价,并且融合精确度高。其次,在双簇头安全融合方案(DCSA)的基础上,通过在节点间加入对称密钥,采用分布式验证方法,使节点认证与融合同时进行,在向上融合的过程中立即证实子节点融合数据的完整性。同时,利用红黑簇头的监督特性,能够定位恶意节点,增强抗共谋攻击能力。该方案保证与DCSA相同安全等级的前提下,能够及早检测并丢弃错误数据,提高了完整性检测机制的效率,且具有更低的网络能耗。最后,通过理论分析论证了两种类型的安全数据融合算法的高效性和可靠性,并通过实验模拟验证了安全数据融合方案的可行性。
[Abstract]:Wireless sensor network is a resource-limited, distributed, self-organizing, multi-hop, data-centric network. Its advantages of low cost and high flexibility make it widely used in military reconnaissance, environmental monitoring, medical health, traffic monitoring and other fields. Data fusion mechanism is applied to wireless sensor networks to reduce energy consumption and network collision, but also brings new security threats. An attacker can not only forge, replay, tamper and discard the data of ordinary sensor nodes, but also obtain, change or discard the fusion results by directly compromising the higher level fusion nodes, resulting in disastrous consequences. Aiming at the deficiency of the existing research results, this paper designs an improved security data fusion scheme from the aspects of confidentiality and integrity, adopts slice reorganization technology and monitoring reputation mechanism, and finally achieves the security goal required for data fusion. The main work in this paper includes the following three aspects: firstly, a lightweight privacy protection scheme is proposed, which uses private seeds and intra-cluster slicing technology to achieve privacy protection. Random probability is used to determine the maximum number of segments per cluster and the number of nodes in each cluster to reduce the communication and computational costs and to improve the accuracy of the fusion results. Compared with CPDA algorithm, the proposed scheme has less computational and communication costs and high fusion accuracy on the premise of effectively guaranteeing privacy. Secondly, on the basis of double cluster head secure fusion scheme (DCSA), by adding symmetric key between nodes and adopting distributed verification method, the authentication and fusion of nodes can be carried out simultaneously. In the process of upward fusion, the integrity of the fusion data is confirmed immediately. At the same time, the red and black cluster heads can be used to locate malicious nodes and enhance their ability to resist collusion attacks. On the premise of the same security level as DCSA, this scheme can detect and discard the error data as early as possible, improve the efficiency of the integrity detection mechanism, and have lower network energy consumption. Finally, the high efficiency and reliability of two kinds of secure data fusion algorithms are demonstrated through theoretical analysis, and the feasibility of the secure data fusion scheme is verified by experimental simulation.
【学位授予单位】:哈尔滨工程大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP212.9;TN915.08

【参考文献】

相关期刊论文 前3条

1 范永健;陈红;张晓莹;;无线传感器网络数据隐私保护技术[J];计算机学报;2012年06期

2 杨庚;王安琪;陈正宇;许建;王海勇;;一种低耗能的数据融合隐私保护算法[J];计算机学报;2011年05期

3 周水庚;李丰;陶宇飞;肖小奎;;面向数据库应用的隐私保护研究综述[J];计算机学报;2009年05期



本文编号:2133240

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2133240.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户7ab11***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com