Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks

被引:0
|
作者
Peng Li [1 ,2 ]
Chao Xu [1 ]
He Xu [1 ,2 ]
Lu Dong [1 ]
Ruchuan Wang [1 ,2 ]
机构
[1] School of Computer Science, Nanjing University of Posts and Telecommunications
[2] Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
wireless sensor network; privacy protection; slice technology; privacy homomorphism; collection tree protocol;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
引用
收藏
页码:158 / 170
页数:13
相关论文
共 50 条
  • [1] Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks
    Li, Peng
    Xu, Chao
    Xu, He
    Dong, Lu
    Wang, Ruchuan
    [J]. CHINA COMMUNICATIONS, 2019, 16 (05) : 158 - 170
  • [2] Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
    Li, Peng
    Xu, Chao
    Xu, He
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) : 190 - 212
  • [3] Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data
    Zhang, Hong
    Li, Pei
    [J]. Journal of Cyber Security and Mobility, 2023, 12 (06): : 845 - 868
  • [4] A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks
    Li, Cheng
    Zhang, Guoyin
    Mao, Yan
    Zhao, Xin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Secure Data Aggregation in Wireless Sensor Networks Using Privacy Homomorphism
    Sandhya, M. K.
    Murugan, K.
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 482 - 490
  • [6] Research on Wireless Sensor Networks Based on Data Acquisition Technology
    Wei, Ling
    Guo, Yanting
    [J]. COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 482 - 486
  • [7] Research on Data Aggregation Technology Based on Wireless Sensor Networks
    Wang, Tianming
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 127 - 134
  • [8] Privacy Protection of Node Location and Data in Wireless Sensor Networks
    Huan, He
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 34 - 39
  • [9] Multi-level data fusion algorithm towards privacy protection in wireless sensor networks
    Wang, Zheng
    Li, Liang
    Ao, Chen
    Wu, Dapeng
    Zhou, Wenjun
    Yu, Xiaojun
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 25 (03) : 265 - 283
  • [10] Symmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks using Privacy Homomorphism: A Review
    Jose, Josna
    Jose, Joyce
    Ilyas, Muhammed H.
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE (ICIS), 2016, : 275 - 280