...
首页> 外文期刊>Journal of intelligent & fuzzy systems: Applications in Engineering and Technology >Energy measure cluster based concealed aggregation for confidentiality and integrity in WSN
【24h】

Energy measure cluster based concealed aggregation for confidentiality and integrity in WSN

机译:能量测量集群基于WSN的机密性和完整性的隐藏聚合

获取原文
获取原文并翻译 | 示例
           

摘要

Wireless sensor networks (WSNs) is a network of resource constrained sensors deployed in unattended region for environmental monitoring. The resource constrained and ad-hoc nature of WSN stances lot of challenges to the research community when designing protocols for such environments. Now a days WSN is widely deployed from environmental monitoring to military applications. So secure data transmission is mandated in WSNs when it is used for mission critical applications. Data aggregation is a widely used method in WSNs for reducing communication overhead by mitigating unwanted data transmissions. But upholding accuracy of such aggregated data and providing security for the same is a challenging task. In this paper we propose Cluster based Concealed data Aggregation for Confidentiality and Integrity(C-CASIN) in WSN. It uses Elliptic Curve Cryptography based Elgamal additive homomorphic encryption scheme for providing Confidentiality and Integrity.EC-Elgamal Signature algorithm supports for authenticity. By supporting end-to-end encryption proposed method provides security with reduced computation and communication overheads. Results show that proposed method defend against various possible attacks and malicious behavior with the extended network lifetime of 15 to 20 percentage when comparing with basic secure model.
机译:无线传感器网络(WSN)是部署在无人看管区域的资源受限传感器网络,用于环境监测。在为这些环境的协议设计协议时,WSN的资源受限制和临时性质对研究界的挑战。现在,WSN广泛从环境监测到军事应用。如此,在WSN中使用安全数据传输时,在WSN中用于任务关键应用程序。数据聚合是WSN中的广泛使用的方法,用于通过减轻不需要的数据传输来减少通信开销。但是坚持这些汇总数据的准确性并为其提供安全性是一个具有挑战性的任务。在本文中,我们在WSN中提出了基于基于集群的隐藏数据聚集,用于WSN中的机密性和完整性(C-CALIN)。它采用基于椭圆曲线加密的伊利伽利热曲面均匀加密方案,用于提供机密性和Integrity.ec-Elgamal签名算法支持真实性。通过支持端到端加密,提出的方法提供了减少计算和通信开销的安全性。结果表明,当与基本安全模型进行比较时,提出的方法抵御各种可能的攻击和恶意行为,增加了15至20个百分比的延伸。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号