4.7 Article

IPSadas: Identity-privacy-aware secure and anonymous data aggregation scheme

期刊

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
卷 37, 期 8, 页码 5290-5324

出版社

WILEY
DOI: 10.1002/int.22793

关键词

anonymous communication; data aggregation; identity privacy; key negotiation; WSN

资金

  1. EU Horizon 2020 Dominoes Project [771066]
  2. Natural Science Foundation of Shandong Province [ZR2019MF062]

向作者/读者索取更多资源

Intelligent systems are technologically advanced machines that can sense and respond to the surrounding environment, widely used in various fields. This research proposes a secure and anonymous data aggregation scheme, utilizing key negotiation, secure information transmission, and aggregation routing techniques to protect the identity privacy of important nodes and defend against various attacks effectively.
Intelligent systems are technologically advanced machines that can sense and respond to the surrounding environment. They have been widely used in medicine, military, transportation, automation, and other fields. However, when these systems deal with their environments, problems such as leakage of identities may occur. The adversary can damage the system communication and attack important nodes. To handle resource-constrained wireless sensor network environments, we propose a secure and anonymous data aggregation scheme. First, based on the bilinear mapping operation and onion routing concepts, we propose a key negotiation and secure information transmission scheme, which conducts confidential transmission and anonymous forwarding of messages in data aggregation. Second, an aggregation routing scheme based on link direction and residual energy is proposed to pledge messages that can arrive the base station without passing through many nodes, which saves network resources to a certain extent. Third, on the basis of the first two contributions, we propose an identity-privacy-aware secure and anonymous data aggregation scheme that protects the identity's privacy. This scheme can conceal the real identity of important nodes and protect the anonymity of messages and link relationships. In addition, an anonymous identity update and synchronization scheme is also proposed to ensure the reliability and security of communication. Meanwhile, our performance evaluations and simulations show that the proposed framework is more effective than several standard schemes with respect to the ability against various attacks, security, and overhead.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据