首页 | 本学科首页   官方微博 | 高级检索  
     

A Power Efficient Aggregation of Encrypted Data in Wireless Sensor Network
引用本文:HUANG Xingyang YANG Ming. A Power Efficient Aggregation of Encrypted Data in Wireless Sensor Network[J]. 武汉大学学报:自然科学英文版, 2006, 11(6): 1563-1568. DOI: 10.1007/BF02831821
作者姓名:HUANG Xingyang YANG Ming
作者单位:Institute of Command Automation, PLA University of Science and Technology, Nanjing 210007, Jiangsu, China
摘    要:0 IntroductionWireless sensor networks ( WSNs) usually consists oflarge number of nodes ,its typical applicationsincludehabitat monitor[1-3],robotic toys[4],target tracking[5], bat-tlefield monitoring[6].Compare totraditional network, WSNhas followingi mportance features :①Due tothe broadcast nature of the transmission medi-umand deployingin unattended and often adversarial environ-ments ,these make information more vulnerable and exposenodesincur physical attack. Whenthe networkis deploye…

关 键 词:数据收集 秘密同态 完全安全 网络聚类 无线传感器网络
文章编号:1007-1202(2006)06-1563-06
收稿时间:2006-05-20

A power efficient aggregation of encrypted data in wireless sensor network
Huang Xingyang,Yang Ming. A power efficient aggregation of encrypted data in wireless sensor network[J]. Wuhan University Journal of Natural Sciences, 2006, 11(6): 1563-1568. DOI: 10.1007/BF02831821
Authors:Huang Xingyang  Yang Ming
Affiliation:(1) Institute of Command Automation, PLA University of Science and Technology, 210007 Nanjing, Jiangsu, China
Abstract:In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregation will consume much more energy than common nodes and may quit the mission in advance due to energy exhausting because of taxing decryption and re-encryption operation; moreover, it will bring complex key management to ensure the security of the data and corresponding keys. This paper was designed specifically to address above problem based on the thought of privacy homomorphism, It can achieve the perfect security level equal to one-time pad with much lower energy consumption; moreover, it can be proved to resist the attack of node capture. Using the simulation and analysis, we show that our scheme consume the energy only about 21% of AED scheme.
Keywords:data aggregation  privacy homomorphism  perfect security  network clustering  wireless sensor network
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号