研究生: |
蕭英助 |
---|---|
論文名稱: |
Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks 於無線感測網路中可還原的私密資料聚合之研究 |
指導教授: | 孫宏民 |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2008 |
畢業學年度: | 96 |
語文別: | 英文 |
論文頁數: | 50 |
中文關鍵詞: | 無線感測網路 、資料聚合 、橢圓曲線密碼學 、同態加密 |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在分群式無線感測網路中,可以透過資料聚合的技術降低資料傳輸時的負擔,然而感測器甚至是CH(cluster head)可能會被惡意攻擊者所捕獲,因此為避免資料在聚合的過程被惡意攻擊者所取得,一種名為私密資料聚合的方法被提出。在私密資料聚合的方法中,不需要先將個別的密文解密取得明文後再進行資料聚合的運算,而是可以直接對加密過的密文進行資料聚合的運算。但是我們發現現有的私密資料聚合的方法都是不可還原的特性,更精確地說,資料收集中心僅會收到CH所傳送的經過聚合運算後的結果,沒有辦法得知個別感測器所送出的資料,這種特性會有兩種缺點:第一,資料收集中心無法驗證所有資料的完整性;第二,可使用的資料聚合運算的種類被限制住了,舉例來說,私密資料加密方法只提供對密文進行加法的運算,當資料收集中心想要由加總的結果找出最大值和最小值分別是屬於哪些感測器送出時,便不適用。在此論文,我們針對同質無線感測網路以及異質無線感測網路分別提出了可還原的私密資料聚合方法,我們利用同態加密達成可還原的特性,另外我們提供了驗證所有資料完整性的機制,以及我們的方法適用於所有資料聚合的運算,在論文的最後我們針對安全性以及效率有完整的分析與評估。
[1] I.F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci. A Survey
on Sensor Networks. IEEE Commun. Mag., 40:102{114, Aug. 2002.
[2] Seema Bandyopadhyay and E.J. Coyle. An Energy E±cient Hierarchical Clus-
tering Algorithm for Wireless Sensor Networks. In Proc. IEEE 22nd Annual
Joint Conference on Computer and Communications Societies (INFOCOM'03),
volume 3, pages 1713{1723, April 2003.
[3] E.O. Bla¼ and M. Zitterbart. Towards Acceptable Public-Key Encryption in
Sensor Networks. In Proc. 2nd International Workshop on Ubiquitous Comput-
ing., 2005.
[4] D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Veri‾ably
Encrypted Signatures from Bilinear Maps. In Proc. Eurocrypt, volume 2656,
pages 416{32. Springer, 2003.
[5] H. C» am, S. Ä Ozdemir, P. Nair, D. Muthuavinashiappan, and H. Ozgur Sanli.
Energy-E±cient Secure Pattern Based Data Aggregation for Wireless Sen-
sor Networks. Jurnal of Computer Communications, ELSEVIER, 29:446{455,
2006.
[6] C. Castelluccia, E. Mykletun, and G. Tsudik. E±cient Aggregation of En-
crypted Data in Wireless Sensor Networks. In Proc. 2nd Annual International
Conference on Mobile and Ubiquitous Systems, pages 109{117, July 2005.
[7] R. Cristescu and B. Beferull-Lozano. Lossy Network Correlated Data Gathering
with High-Resolution Coding. IEEE Trans. Inf. Theory, 52:2817{2824, June
2006.
[8] S.R. Das, C.E. Perkins, and E.M. Royer. Performance comparison of two on-
demand routing protocols for ad hoc networks. In Proc. IEEE 19th Annual
Joint Conference on IEEE Computer and Communications Societies (INFO-
COM'00), volume 1, pages 3{12, 2000.
[9] X. Du and Y. Xiao. Energy e±cient Chessboard Clustering and Routing in
Heterogeneous Sensor Networks. International Journal of Wireless and Mobile
Computing, 1:121{130, 2006.
[10] Xiaojiang Du, M. Guizani, Yang Xiao, and Hsiao-Hwa Chen. Two Tier Secure
Routing Protocol for Heterogeneous Sensor Networks. IEEE Trans. Wireless
Commun., 6:3395{3401, Sept. 2007.
[11] E.J. Duarte-Melo and Mingyan Liu. Analysis of Energy Consumption and Life-
time of Heterogeneous Wireless Sensor Networks. In Proc. IEEE International
Conference on Global Telecommunications (GLOBECOM'02), volume 1, pages
21{25, Nov. 2002.
[12] G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar. State of The Art in Ultra-Low
Power Public Key Cryptography for Wireless Sensor Networks. In Proc. IEEE
3rd International Workshops on Pervasive Computing and Communications
(PerCom'05), pages 146{150, March 2005.
[13] J. Girao, D. Westho®, M. Schneider, N.E.C.E. Ltd, and G. Heidelberg. CDA:
Concealed Data Aggregation for Reverse Multicast Tra±c in Wireless Sen-
sor Networks. In Proc. IEEE International Conference on Communications
(ICC'05), volume 5, 2005.
[14] P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Trans.
Inf. Theory, 46:388{404, March 2000.
[15] N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz. Comparing Elliptic
Curve Cryptography and RSA on 8-bit CPUs. In Proc. International Workshop
on Cryptographic Hardware and Embedded Systems (CHES'04). Springer, 2004.
[16] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-E±cient
Communication Protocol for Wireless Microsensor Networks. In Proc. IEEE
33rd Annual Hawaii International Conference on System Sciences, Jan. 2000.
[17] Lingxuan Hu and D. Evans. Secure Aggregation for Wireless Networks. In
Proc. IEEE International Symposium on Applications and the Internet, pages
384{391, Jan. 2003.
[18] Crossbow Technology Inc. http://www.xbow.com. Technical report.
[19] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Di®usion: A scal-
able and Robust Communication Paradigm for Sensor Networks. In Proc.
ACM/IEEE International Conference on Mobile Computing and Networking,
pages 56{67, 2000.
[20] C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture
for wireless sensor networks. In Proc. ACM 2nd international conference on
Embedded networked sensor systems, pages 162{175, 2004.
[21] C. Karlof and D.Wagner. Secure Routing in Wireless Sensor Networks: Attacks
and Countermeasures. In Proc. IEEE 1st International Workshop on Sensor
Network Protocols and Applications, pages 113{127, May 2003.
[22] N. Koblitz, A. Menezes, and S. Vanstone. The State of Elliptic Curve Cryptog-
raphy. Jurnal of Designs, Codes and Cryptography, SPRINGER, 19:173{193,
2000.
[23] L. Krishnamachari, D. Estrin, and S. Wicker. The Impact of Data Aggregation
in Wireless Sensor Networks. In Proc. IEEE 22nd International Workshops on
Distributed Computing Systems, pages 575{578, July 2002.
[24] An Liu and Peng Ning. TinyECC: A Con‾gurable Library for Elliptic Curve
Cryptography in Wireless Sensor Networks. In Proc. IEEE International Con-
ference on Information Processing in Sensor Networks (IPSN'08), pages 245{
256, April 2008.
[25] S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong. TAG: A Tiny AGgre-
gation Service for Ad-Hoc Sensor Networks. In Proc. USENIX 5th Symposium
on Operating Systems Design and implementation, 2002.
[26] A. Manjeshwar and D.P. Agrawal. TEEN: A Routing Protocol for Enhanced
E±ciency in Wireless Sensor Networks. In Proc. IEEE 15th International Sym-
posium on Parallel and Distributed Processing, pages 2009{2015, April 2001.
[27] K. Mccusker, N. O'Connor, and D. Diamond. Low-Energy Finite Field Arith-
metic Primitives for Implementing Security in Wireless Sensor Networks. In
Proc. IEEE International Conference on Communications, Circuits and Sys-
tems, volume 3, pages 1537{1541, June. 2006.
[28] V.P. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and N. Shro®. A Min-
imum Cost Heterogeneous Sensor Network with A Lifetime Constraint. IEEE
Trans. Mobile Comput., 4:4{15, Feb. 2005.
[29] E. Mykletun, J. Girao, and D. Westho®. Public Key Based Cryptoschemes for
Data Concealment in Wireless Sensor Networks. In Proc. IEEE International
Conference on Communications, volume 5, pages 2288{2295, June. 2006.
[30] A. Perrig, J. Stankovic, and D. Wagner. Security in Wireless Sensor Networks.
Communications of the ACM, 47:53{57, 2004.
[31] JM Pollard. Monte Carlo Methods for Index Computation (modp). Mathemat-
ics of Computation, 32:918{924, 1978.
[32] B. Przydatek, D. Song, and A. Perrig. SIA: Secure Information Aggregation
in Sensor Networks. In Proc. ACM 1st international conference on Embedded
Networked Sensor Systems, pages 255{265, 2003.
[33] H.O. Sanli, S. Ozdemir, and H. Cam. SRDA: Secure Reference-Based Data
Aggregation Protocol for Wireless Sensor Networks. In Proc. IEEE 60th Inter-
national Conference on Vehicular Technology (VTC'04-Fall), volume 7, pages
4650{4654, Sept. 2004.
[34] O. Ugus, D. Westho®, R. Laue, A. Shoufan, and S. Huss. Optimized Implemen-
tation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless
Sensor Networks. In Proc. ACM 2nd International Workshop on Embedded
Systems Security (WESS'07), 2007.
[35] A.S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz. Energy Anal-
ysis of Public-Key Cryptography for Wireless Sensor Networks. In Proc. 3rd
IEEE International Conference on Pervasive Computing and Communications
(PerCom'05), pages 324{328, March 2005.
[36] D. Westho®, J. Girao, and M. Acharya. Concealed Data Aggregation for Re-
verse Multicast Tra±c in Sensor Networks: Encryption, Key Distribution, and
Routing Adaptation. IEEE Trans. Mobile Comput., 5:1417{1431, Oct. 2006.
[37] Yongdong Wu, Di Ma, Tieyan Li, and R.H. Deng. Classify Encrypted Data
in Wireless Sensor Networks. In Proc. IEEE 60th International Conference on
Vehicular Technology (VTC'04), volume 5, pages 3236{3239, Sept. 2004.
[38] Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A Survey of
Key Management Schemes in Wireless Sensor Networks. Jurnal of Computer
Communications, ELSEVIER, 30:2314{2341, 2007.
[39] Bo Yu and Bin Xiao. Detecting Selective Forwarding Attacks in Wireless Sen-
sor Networks. In Proc. IEEE 20th International Symposium on Parallel and
Distributed Processing (IPDPS'06), April 2006.
[40] S. Zhu, S. Setia, and S. Jajodia. LEAP: E±cient security mechanisms for large-
scale distributed sensor networks. ACM Trans. on Sensor Networks (TOSN),
2:500{528, 2006.
49