首页    期刊浏览 2025年02月23日 星期日
登录注册

文章基本信息

  • 标题:Encryption and Signature Scheme implementation for Data Integrity using Recoverable Concealed Data Aggregation
  • 本地全文:下载
  • 作者:P. Gunasekaran ; B.Sivakumar
  • 期刊名称:International Journal of Electronics and Computer Science Engineering
  • 电子版ISSN:2277-1956
  • 出版年度:2012
  • 卷号:1
  • 期号:4
  • 页码:2417-2423
  • 出版社:Buldanshahr : IJECSE
  • 摘要:Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore, reducing the power consumption is a critical concern for a WSN. Unfortunately, an adversary has the ability to capture cluster heads. It would cause the compromise of the whole cluster; these schemes restrict the data type of aggregation or cause extra transmission overhead. Besides, an adversary can still obtain the sensing data of its cluster members after capturing a cluster head. A well-known approach named Concealed Data end-to-end encryption and in-networking processing in WSN. Since CDA applies privacy homomorphism encryption with additive homomorphism, cluster heads are capable of executing addition operations on encrypted numeric data. There are several data aggregation schemes based on privacy homomorphism encryption have been proposed. These schemes provide better security compared with traditional aggregation However, the base station only retrieves the aggregated result, not individual data, which causes two problems. The usage of aggregation functions is constrained and base station cannot confirm data integrity and authenticity
国家哲学社会科学文献中心版权所有