咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Comprehensive Analysis of Secu... 收藏

Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

作     者:Weidong Fang Wuxiong Zhang QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 

作者机构:Key Laboratory of Wireless Sensor Network&CommunicationShanghai Institute of Micro-system and Information TechnologyChinese Academy of SciencesShanghai201899China Shanghai Research Center for Wireless CommunicationShanghai201210China College of Physics and Electronic Information EngineeringQinghai University for NationalitiesXining810007China School of Computer Science and TechnologyChina University of Mining and TechnologyXuzhou221116China Infromation Communication Technology DepartmentWollo UniversityDessie EthiopiaEthiopia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2019年第61卷第8期

页      面:583-599页

核心收录:

学科分类:0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 

基  金:partially supported by the National Natural Science Foundation of China(61571004) the Shanghai Natural Science Foundation(No.17ZR1429100) the National Science and Technology Major Project of China(No.2018ZX03001017-004) the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20170074) 

主  题:Industrial wireless sensor network wireless sensor network cyber security secure data aggregation protocol 

摘      要:As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more ***,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of *** performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in *** consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this ***,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data *** this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for ***,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分