CN103825743A - Data security aggregation method with privacy protection function - Google Patents

Data security aggregation method with privacy protection function Download PDF

Info

Publication number
CN103825743A
CN103825743A CN201410049726.4A CN201410049726A CN103825743A CN 103825743 A CN103825743 A CN 103825743A CN 201410049726 A CN201410049726 A CN 201410049726A CN 103825743 A CN103825743 A CN 103825743A
Authority
CN
China
Prior art keywords
data
node
identity
algorithm
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410049726.4A
Other languages
Chinese (zh)
Inventor
吴蒙
丁超
杨立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201410049726.4A priority Critical patent/CN103825743A/en
Publication of CN103825743A publication Critical patent/CN103825743A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a data security aggregation method with a privacy protection function. The objective of the invention is to protect the privacy and confidentiality of data in an aggregation process. According to the data security aggregation method of the invention, an identity-based negotiation mechanism with authentication keys, a homomorphic encryption mechanism and an aggregation signature mechanism are adopted in a data aggregation process, and therefore, the privacy and the confidentiality in the data aggregation process can be protected, and impact on system operation efficiency can be decreased under the premise that system security can be guaranteed. The identity-based negotiation mechanism with the authentication keys, the homomorphic encryption mechanism and the aggregation signature mechanism are integrated in a sensor node, and the confidentiality, integrity and availability of end-to-end data in a high hybrid scene can be ensured without intra-network data processing efficiency reduced. The data security aggregation method with the privacy protection function of the invention has the advantages of invulnerability, scalability, dynamic property and validity.

Description

A kind of data security polymerization with privacy protection function
Technical field
The present invention is a kind of convergence for massive wireless sensor and blending algorithm, can protect the privacy of sensitive data.Belong to the technical field of data security.
Background technology
The information that exists thing in Internet of Things represents the contradiction between the information the main consuming body understandability deficiency of diversification of forms and thing, and therefore existing method for secret protection can not solve Internet of Things Privacy Protection well.
The data aggregate algorithm of moment sensor network adopts the security mechanism based on symmetric cryptographic algorithm (SKC-based) mostly, and this type of security mechanism is difficult to solve secret key safety and distributes and upgrade, and Data Source is credible and the problem such as secret protection.Take the now widely used link layer security mechanisms TinySec based on TinyOS operating system as example, this mechanism is shared unique symmetric key in the whole network, and itself does not support key updating, research shows, adopts such cipher key management scheme TinySec to support 2 at most 16the safe transmission of individual packet, in some long-term observation projects, be difficult to practicality, (Yi great Ya island is the safe transmission that example TinySec only can guarantee approximately 45 days), simultaneously because the whole network is shared identical key, is easy to cause the single-point collapse of network security.
Summary of the invention
Technical problem: the object of the invention is to propose a kind of data security polymerization with privacy protection function, solve privacy and confidentiality in data aggregate process.
Technical scheme: mainly contain two classes about the distribution of sensor network cipher key safety at present: random key preassignment and the method for distributing key based on PKI.The preallocated basic thought of random key is to set up a pool of keys at base station end, a subset before network design in each node prestored secret key pond, and after network topology forms, whether two adjacent node inspections have shared key.The shortcoming of this type of method for distributing key is that key storage is large, network connectivty and fail safe also a little less than.Security mechanism based on PKI realizes foundation and the renewal of key in the situation without PKIX as TinyPBC is supported in, and support to a certain extent key authentication, and opposing man-in-the-middle attack, have stronger fail safe, but amount of calculation is higher.
The present invention is a kind of data security polymerization with privacy protection function, adopts band authenticated key agreement mechanism, homomorphic cryptography mechanism and the aggregate signature mechanism based on identity in data aggregate process; Can solve privacy and confidentiality in data aggregate process, under the prerequisite that guarantees security of system, reduce the impact on running efficiency of system simultaneously; Its concrete grammar is:
1) set up the band authenticated key agreement mechanism based on identity: the private key maker PKG in base station deployment based on identity, base station is each Node leading-in common parameter, node identity ID iand the private key s of node i; After initialization completes, node is carried out key agreement by the lightweight implicit authentication Key Establishing algorithm TinyIBAK based on identity;
2) set up the end to end integrity indentification protocol based on bilinear map: build a kind of polymerisable signature mechanism, in this mechanism, the signature that different user calculates different messages can aggregate into a signature, can net the interior end to end integrity authentication mechanism of processing for sensor network provides support; Consider signature mechanism relate to calculating more complicated to computing, in conjunction with homomorphic Hash functions, further reduce the integrity protection mechanism of aggregated data;
3) set up the end-to-end Privacy preserving algorithms based on homomorphic cryptography: select the core cryptographic algorithm of elliptic curve encryption algorithm ElGamal as homomorphism secret protection scheme; on the basis of the built-in aggregation protocol TAG of sensor node operation system TinyOS and the efficient distributed sensor networks sub-clustering of mixed tensor aggregating algorithm HEED; build the private data polymerization based on ElGamal; ensure that data are processed in net and transmitting procedure in privacy, the performance of optimization secret protection safe aggregating algorithm.
The present invention is the integrated band authenticated key agreement mechanism based on identity in sensor node, not reducing under the prerequisite of the efficiency of data processing in net, guarantees that the high scene lower end that mixes is to end data privacy, integrality and availability, the security performance of raising system.Than existing homogeneous data aggregating algorithm, the present invention has following security property: (1) survivability (resilience): individual node is captured the fail safe that does not affect other dual node communications; (2) extensibility (scalability): protocol overhead does not significantly rise with network size expansion; (3) dynamic (dynamic): support key updating and network topology change; (4) validity (efficiency): protocol overhead meets the resource limitation of sensor node, and key connectedness is high.The present invention simultaneously also sets up homomorphic cryptography mechanism and aggregate signature mechanism, under the prerequisite that guarantees security of system, reduces as far as possible the impact on running efficiency of system.
Beneficial effect: the present invention has following characteristics:
The Design Mode of protocol-independent: application level function design is isolated completely with basic communication protocol, there is the function that complete network control and data show, and application layer data packet protocol form independently, there is good compatibility and autgmentability for the sensor network communication agreement (as the communication protocol of TinyOS and Zigbee) of main flow;
Support from the dynamic energy management of arouse machine processed: promptly wake the transceiver in resting state up when node listens to while wanting message, thereby guarantee that no matter sensor node is whether in resting state, can both receive significant data timely notification gateway.This mechanism can reduce as much as possible the cycle on duty in guaranteeing accuracy of data acquisition, thereby reduces energy consumption;
Flexile data acquisition and network configuration mode: system provides time driving, event-driven and three kinds of data acquisition schemes of query driven, multiple varigrained network configuration mode is provided simultaneously, this system both can be carried out precision for single node and be controlled, as wake the node in dormancy up, control the cycle on duty of node etc., also can carry out global configuration for communication protocol, as startup thresholding of route discovery etc. is set.
The real-time tracking of system mode and dynamically demonstration: varigrained system state monitoring function is provided, both can follow the tracks of the variation of single intra-node running status, also can follow the tracks of the topology of global network, the variation of data traffic, the homomorphism of status of support shows simultaneously.User can capture in time in network accidental variation occurs, and makes reply within the short time.
Supported data secret protection: introduce lightweight public key cryptography technology; make up the deficiency of symmetric cryptography aspect encryption key distribution; and the data transmission characteristics of combined sensor network reverse multi-case, build and support the private data of netting interior data processing to transmit the security solution authenticating with source.
Accompanying drawing explanation
Fig. 1 is the construction strategy schematic diagram in lightweight cryptographic algorithm storehouse,
Fig. 2 is the building process schematic diagram of cross-platform lightweight cryptographic libraries,
Fig. 3 is TinyIBAK session key agreement process schematic diagram,
Fig. 4 is that TinyIBAK software is realized configuration diagram,
Fig. 5 is the prototype code implementation framework schematic diagram of polymerizable signature.
Embodiment
A kind of data security polymerization with privacy protection function of the present invention is: in data aggregate process, adopt band authenticated key agreement mechanism, homomorphic cryptography mechanism and the aggregate signature mechanism based on identity; Can solve privacy and confidentiality in data aggregate process, under the prerequisite that guarantees security of system, reduce the impact on running efficiency of system simultaneously; Its concrete grammar is:
1) set up the band authenticated key agreement mechanism based on identity: the private key maker PKG in base station deployment based on identity, base station is each Node leading-in common parameter, node identity ID i(can be the MAC Address of node), and the private key s of node i; After initialization completes, node is carried out key agreement by the lightweight implicit authentication Key Establishing algorithm TinyIBAK based on identity;
2) set up the end to end integrity indentification protocol based on bilinear map: build a kind of polymerisable signature mechanism, in this mechanism, the signature that different user calculates different messages can aggregate into a signature, can net the interior end to end integrity authentication mechanism of processing for sensor network provides support; Consider signature mechanism relate to calculating more complicated to computing, in conjunction with homomorphic Hash functions, further reduce the integrity protection mechanism of aggregated data;
3) set up end-to-end Privacy preserving algorithms based on homomorphic cryptography: the ElGamal(EC-EG that selects elliptic curve cipher version) as the core cryptographic algorithm of homomorphism secret protection scheme, at existing aggregation protocol (the built-in aggregation protocol of TinyOS (TAG), the efficient distributed sensor networks sub-clustering of mixed tensor aggregating algorithm (HEED)) the upper private data polymerization building based on ElGamal, ensure data net in processing and transmitting procedure in privacy, in heterogeneous networks topology, raising execution efficiency under different safety class and reduction overhead, optimize the performance of the safe aggregating algorithm of secret protection.
1. lightweight cryptographic algorithm and cross-platform cryptographic libraries (LWCrypt)
The problem existing for the existing cryptographic libraries of increasing income, the present invention selects Ben Lynn PBC Library and OpenECC as source, rewrite application programming interfaces (API) function, revise the part that depends on Linux GMP and OpenSSH java standard library in original function storehouse, can on resource-constrained sensor node platform, move.Simultaneously in to computing; Super unusual elliptic curve on introducing binary field to accelerate the execution speed of Password Operations, reduces RAM expense as datum curve; Optimized code structure, the final binary image volume generating of compression, to adapt to the limited memory space of node, the lightweight of public key cryptography technology, its strategy is as shown in Figure 1.
In the building process of algorithms library, we find, affect being operating as of cryptographic calculations whole efficiency: large integer mould (LIMR) computing, and large multiplication of integers and power operation (LIMS), elliptic curve point multiplication operation (ECSM) computing, bilinearity is to computing (BP).We have analyzed this four specific implementations that operate on sensor network nodes, and time of implementation and overhead, propose following prioritization scheme:
(1) optimization of large integer modular arithmetic (LIMR)
Elliptic curve on sensor network platform uses prime field F pas base field, the modular arithmetic frequently relating in encrypting and decrypting process large prime number p (adopts different divisors m) at every turn.Traditional LIMR directly adopts arithmetic division to realize conventionally, and in elliptic curve cipher computing, efficiency is very low.The present invention adopts Berrett Reduction algorithm, the modular arithmetic of arbitrary integer is converted to twice multiplying and to 2 nmodular arithmetic, retain average information, reduce the computing cost of modular arithmetic.
(2) optimization of large multiplication of integers and power operation (LIMS)
Traditional LIMS computing need to be stored the truth of a matter and exponent number in array, cannot effectively utilize the register of sensor node MCU, the present invention introduces the Hybrid Multiplication algorithm towards assembly code of Gura design, improve the utilance of MCU register, reduce the interoperability between memory and register, reduce the time of implementation of LIMS.
(3) optimization of (ECMS) of elliptic curve point multiplication operation
Dot product is that ECC cryptographic algorithm uses operation the most frequently, and the time of implementation that has statistics to show dot product accounts for whole ECC cryptographic algorithm 90% left and right of running time.Elliptic curve is fastened and is realized point multiplication operation and need contrary (Modular Inverse) computing of mould that trace utilization cost is very high in affine coordinate, conventionally elliptic curve is mapped to projection coordinate and fastens, and convert mould inverse operation to several modular multiplications and realize.The present invention introduces the Mix Point Addition algorithm based on projected coordinate system and the Repeated Doubling algorithm that Hankson proposes, and improves the operation efficiency of ECSM.
(4) optimization of bilinearity to computing (BP)
Select binary field F 2 271on super unusual Elliptic Curve y 2+ y=x+x 3realize bilinearity to computing, can obtain best processing speed and minimum EMS memory occupation.
Optimizing on the basis of crucial Password Operations, the present invention has also realized the cross-platform characteristic in cryptographic algorithm storehouse.Because the sensor node of current main flow uses low and middle-end single-chip microcomputer as core microcontroller mostly, and only have GCC-MAKE instrument chain can on multiple single-chip microcomputer platform, realize the compiling of program simultaneously, connect, download, so the present invention selects open source software CMAKE, automation compilation script (for example avr-gcc generating under particular platform is set according to user, msp-gcc, arm-gcc, the make script of ppc-gcc), with the conditional compilation statement in trigger source code, thereby realize the dynamic-configuration of same source code on the node of different frameworks, its process as shown in Figure 2.
2. the band authentication key agreement method based on identity
Sensor network lacks Public Key Infrastructure(PKI), and cannot look like conventional wireless network (as wifi, wimax) provides mandate and the issue of PKI like that, is easily subject to man-in-the-middle attack in to Key Establishing process.In order to address this problem, the present invention introduces the off-line cipher key deployment mechanism based on identity.Its main thought is: the private key maker (PKG) in base station deployment based on identity, before network design, first completion system initialization of base station, is each Node leading-in common parameter, node identity ID i(can be the MAC Address of node), and the private key s of node i(utilizing the algorithm that identification cipher is learned to calculate).After initialization completes, need to set up the lightweight implicit authentication Key Establishing algorithm TinyIBAK based on identity that the node of key is proposed by the present invention and carry out key agreement, its process as shown in Figure 3.
Wherein interim PKI W a, W bgenerated through secure hash function by agreement participant's PKI and random number timestamp, guarantee that each key agreement can produce diverse shared key, utilize in the past cannot derive key current to key.Owing to only having node A(B) can calculate W a(W b), therefore can be by W aregard one " implicit expression signature " as, implicitly authenticated in this way the source of exchange message, thereby can resist man-in-the-middle attack.Only need calculate a bilinearity by every side and can obtain a shared session key to functional value, amount of calculation is moderate.
In the time that node is judged to be malfunctioning node or malicious node by base station, the key revocation to node can be carried out by the mode of broadcast node private key in base station.In the time having new node to add network, network management system is carried out initialization step, to the new node node identifier id that prestores, node private key d id, system parameters; New node is carried out TinyIAKE and can be set up and share session key with neighbor node after disposing, do not affect other nodes in net.
On TinyOS-2.x, realized TinyIBAK algorithm, this algorithm is based upon on the basis in the cross-platform public key algorithm of lightweight storehouse (LwCrypt) of the present invention's proposition.Algorithm realize framework as shown in Figure 4, whole algorithm is by three TinyOS module compositions: Key Agree assembly is responsible for generating interim PKI and is calculated shared secret; Identity Verify assembly uses hmac algorithm to calculate also authentication of users both sides ID and the temporarily authenticating tag of PKI; SecPrimitives component package is from the basic security primitive in LwCrypt cipher function storehouse, and provides access interface for other assemblies.TinyIBAK also uses the built-in Timer of TinyOS system and Random interface (being provided by TimerC and RandomLFSR assembly respectively) to carry out the random delay in process key negotiations process simultaneously.When the request receiving from key agreement session setup side, node sends data after starting timer random delay a period of time, prevents channel block.
3. the end to end integrity indentification protocol based on bilinear map
GDH(Gap Diffie-Hellman) group solves CDH(Computational Diffie-Hellman on this group) problem hard, and solution DDH(Decision Diffie-hellman) problem is easy.The present invention utilizes this special nature of GDH group, builds a kind of polymerisable signature mechanism.In this mechanism, the signature that different user calculates different messages can aggregate into a signature, can net the interior end to end integrity authentication mechanism of processing for sensor network provides support.Its basic thought is to utilize Weil to right to build GDH group from specific elliptic curve (hyperelliptic curve) with Tate, and builds accordingly polymerisable signature mechanism.
Consider signature mechanism relate to calculating more complicated to computing, the present invention, in conjunction with homomorphic Hash functions, has further reduced the integrity protection mechanism of aggregated data, system realize framework as shown in Figure 5.
4. the end-to-end Privacy preserving algorithms based on homomorphic cryptography
The present invention starts with, analyzes the computing cost of each algorithm for encryption, deciphering from the homomorphism character of research elliptic curve cipher, by the bit expansion scale etc. that expressly produces ciphertext; Then according to heterogeneous networks applied environment and topological structure, screen applicable cryptographic algorithm, and build based on this corresponding homomorphism Privacy Preservation Mechanism.
In order to meet the application demand of sensor network, homomorphic cryptography algorithm must meet following four requirements:
(1) cryptographic algorithm has homomorphism character, supports the interior data processing of net of enciphered data;
(2) ciphertext that cryptographic algorithm produces is relatively short, and the increase of the data bits being brought by encryption can not be too many;
(3) amount of calculation of cryptographic algorithm is relatively little, and the cryptographic operation expense of carrying out at sensor node can not be too large;
(4) cryptographic algorithm can be resisted node capture attack and attacked, and in node, without the responsive key of storage, part of nodes is captured can not reveal aggregated data.
According to these four requirements; we filter out tetra-kinds of EC-OU, EC-NS, EC-P and EC-EG and have the derivation algorithm of the elliptic curve cipher of homomorphism character; by comparing the indexs such as computing cost, ciphertext length; we select the ElGamal(EC-EG of elliptic curve cipher version) as the core cryptographic algorithm of homomorphism secret protection scheme; this algorithm only needs the add operation of two somes when polymerization carrying out to encrypt, very little to netting the effectiveness affects of interior processing.
Take EC-EG homomorphic cryptography algorithm as core, can build and support to process homomorphism method for secret protection in net, the method is made up of four probability multinomial algorithms:
(1) key produces (KG): operation KG (1 λ) produce the public private key pair (pk, sk) of base station.Each node is with pk encrypting messages, and base station is with sk decrypt;
(2) encrypt (E): for given plaintext m i, throw random coin r i, carry out encryption function E output ciphertext c i=E pk(m i; r i), head hdr is set i=Φ, output (hdr i, c i);
(3) polymerization (A): for ciphertext (hdr i, c i) and (hdr j, c j), utilize the homomorphism character of EC-EG, produce polymerization value c l=A (c i, c j) and hdr l=hdr i∪ hdr j, output polymerization value (hdr l, c l);
(4) deciphering (D): for the encryption polymerization value c receiving and its head hdr, base station utilizes private key sk to carry out decryption function D deciphering c, output x=D sk(c) as plaintext polymerization value.Wherein, the element in set hdr is the ID that participates in aggregation.
The present invention is at the upper private data polymerization building based on EC-EG of existing aggregation protocol (TAG, HEED), ensures data privacy in processing and transmitting procedure in net.On this basis, analyzed execution efficiency and the overhead of the safe aggregation scheme of above-mentioned secret protection under heterogeneous networks topology, different safety class, the performance of the one-step optimization algorithm of going forward side by side.

Claims (1)

1. there is a data security polymerization for privacy protection function, it is characterized in that adopting band authenticated key agreement mechanism, homomorphic cryptography mechanism and the aggregate signature mechanism based on identity in data aggregate process; Can solve privacy and confidentiality in data aggregate process, under the prerequisite that guarantees security of system, reduce the impact on running efficiency of system simultaneously; Its concrete grammar is:
1) set up the band authenticated key agreement mechanism based on identity: the private key maker PKG in base station deployment based on identity, base station is each Node leading-in common parameter, node identity ID iand the private key s of node i; After initialization completes, node is carried out key agreement by the lightweight implicit authentication Key Establishing algorithm TinyIBAK based on identity;
2) set up the end to end integrity indentification protocol based on bilinear map: build a kind of polymerisable signature mechanism, in this mechanism, the signature that different user calculates different messages can aggregate into a signature, can net the interior end to end integrity authentication mechanism of processing for sensor network provides support; Consider signature mechanism relate to calculating more complicated to computing, in conjunction with homomorphic Hash functions, further reduce the integrity protection mechanism of aggregated data;
3) set up the end-to-end Privacy preserving algorithms based on homomorphic cryptography: select the core cryptographic algorithm of elliptic curve encryption algorithm ElGamal as homomorphism secret protection scheme; on the basis of the built-in aggregation protocol TAG of sensor node operation system TinyOS and the efficient distributed sensor networks sub-clustering of mixed tensor aggregating algorithm HEED; build the private data polymerization based on ElGamal; ensure that data are processed in net and transmitting procedure in privacy, the performance of optimization secret protection safe aggregating algorithm.
CN201410049726.4A 2014-02-13 2014-02-13 Data security aggregation method with privacy protection function Pending CN103825743A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410049726.4A CN103825743A (en) 2014-02-13 2014-02-13 Data security aggregation method with privacy protection function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410049726.4A CN103825743A (en) 2014-02-13 2014-02-13 Data security aggregation method with privacy protection function

Publications (1)

Publication Number Publication Date
CN103825743A true CN103825743A (en) 2014-05-28

Family

ID=50760591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410049726.4A Pending CN103825743A (en) 2014-02-13 2014-02-13 Data security aggregation method with privacy protection function

Country Status (1)

Country Link
CN (1) CN103825743A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125074A (en) * 2014-08-12 2014-10-29 国家电网公司 Charging method with privacy protection in smart power grid
CN104639311A (en) * 2015-01-12 2015-05-20 浙江工商大学 Combining method and system for protecting power utilization privacy and integrity in smart power grid
CN105636044A (en) * 2016-03-09 2016-06-01 佛山市黑盒子科技有限公司 Identity authentication method for low-rate wireless network
CN105933101A (en) * 2016-03-31 2016-09-07 东南大学 Fully homomorphic encryption public key compression method based on parameter high power offset
CN106911789A (en) * 2017-03-10 2017-06-30 北京理工大学 A kind of data transmission method based on user collaborative environment, Transmission system and device
WO2017152423A1 (en) * 2016-03-11 2017-09-14 华为技术有限公司 Key negotiation method, device and system
CN107636669A (en) * 2015-06-15 2018-01-26 诺基亚技术有限公司 The control of undesirable Network
CN107688752A (en) * 2017-08-21 2018-02-13 哈尔滨工程大学 A kind of personalized method for secret protection towards multi views cluster result
CN108400862A (en) * 2018-01-16 2018-08-14 国电南瑞科技股份有限公司 A kind of intelligent power trusted end-user data fusion encryption method
CN108512856A (en) * 2018-04-11 2018-09-07 杭州电子科技大学 The method for secret protection of heat transfer agent Virtual Service in Internet of Things
CN108777613A (en) * 2018-06-01 2018-11-09 杭州电子科技大学 The deblocking method for secure storing of heat transfer agent Virtual Service in Internet of Things
CN109075963A (en) * 2016-05-13 2018-12-21 Abb瑞士股份有限公司 Safety long-distance polymerization
CN109743706A (en) * 2019-02-21 2019-05-10 暨南大学 With the data aggregation method of validation verification function under environment of internet of things
CN111131148A (en) * 2019-11-11 2020-05-08 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN112214733A (en) * 2020-09-30 2021-01-12 中国科学院数学与系统科学研究院 Distributed estimation method and system for privacy protection and readable storage medium
CN112887095A (en) * 2021-01-26 2021-06-01 浙江工商大学 Block chain-based data privacy protection aggregation method for smart grid secondary network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110060909A1 (en) * 2004-11-11 2011-03-10 Certicom Corp. Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
CN103002040A (en) * 2012-12-14 2013-03-27 南京邮电大学 Method for checking cloud computation user data
CN103581175A (en) * 2013-10-17 2014-02-12 江苏科技大学 Safe data aggregation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110060909A1 (en) * 2004-11-11 2011-03-10 Certicom Corp. Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
CN103002040A (en) * 2012-12-14 2013-03-27 南京邮电大学 Method for checking cloud computation user data
CN103581175A (en) * 2013-10-17 2014-02-12 江苏科技大学 Safe data aggregation method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
HUNG-MIN SUN等: "An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks", 《THE 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS2008)》 *
LIJUN YANG等: "TinyIBAK:Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks", 《KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS》 *
MERAD BOUDIA OMAR RAFIK等: "RSAED: ROBUST AND SECURE AGGREGATION OF ENCRYPTED DATA IN WIRELESS SENSOR NETWORKS", 《INTERNATIONAL JOURNAL OF NETWORK SECURITY & ITS APPLICATIONS (IJNSA)》 *
吴蒙等: "大规模传感器网络隐私保护与安全传输", 《南京邮电大学学报(自然科学版)》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125074A (en) * 2014-08-12 2014-10-29 国家电网公司 Charging method with privacy protection in smart power grid
CN104639311A (en) * 2015-01-12 2015-05-20 浙江工商大学 Combining method and system for protecting power utilization privacy and integrity in smart power grid
CN107636669A (en) * 2015-06-15 2018-01-26 诺基亚技术有限公司 The control of undesirable Network
US10887332B2 (en) 2015-06-15 2021-01-05 Nokia Technologies Oy Control of unwanted network traffic
CN107636669B (en) * 2015-06-15 2020-07-24 诺基亚技术有限公司 Control of undesirable network traffic
CN105636044A (en) * 2016-03-09 2016-06-01 佛山市黑盒子科技有限公司 Identity authentication method for low-rate wireless network
WO2017152423A1 (en) * 2016-03-11 2017-09-14 华为技术有限公司 Key negotiation method, device and system
CN105933101B (en) * 2016-03-31 2018-10-23 东南大学 A kind of full homomorphic cryptography public key compression method based on the offset of parameter high order
CN105933101A (en) * 2016-03-31 2016-09-07 东南大学 Fully homomorphic encryption public key compression method based on parameter high power offset
CN109075963A (en) * 2016-05-13 2018-12-21 Abb瑞士股份有限公司 Safety long-distance polymerization
CN106911789A (en) * 2017-03-10 2017-06-30 北京理工大学 A kind of data transmission method based on user collaborative environment, Transmission system and device
CN106911789B (en) * 2017-03-10 2020-09-18 北京理工大学 Data transmission method, transmission system and device based on user collaborative environment
CN107688752A (en) * 2017-08-21 2018-02-13 哈尔滨工程大学 A kind of personalized method for secret protection towards multi views cluster result
CN108400862A (en) * 2018-01-16 2018-08-14 国电南瑞科技股份有限公司 A kind of intelligent power trusted end-user data fusion encryption method
CN108512856A (en) * 2018-04-11 2018-09-07 杭州电子科技大学 The method for secret protection of heat transfer agent Virtual Service in Internet of Things
CN108777613A (en) * 2018-06-01 2018-11-09 杭州电子科技大学 The deblocking method for secure storing of heat transfer agent Virtual Service in Internet of Things
CN109743706A (en) * 2019-02-21 2019-05-10 暨南大学 With the data aggregation method of validation verification function under environment of internet of things
CN109743706B (en) * 2019-02-21 2021-10-08 暨南大学 Data aggregation method with validity verification function in Internet of things environment
CN111131148A (en) * 2019-11-11 2020-05-08 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN111131148B (en) * 2019-11-11 2022-03-22 重庆邮电大学 Aggregation method and system capable of protecting privacy data and facing smart power grid
CN112214733A (en) * 2020-09-30 2021-01-12 中国科学院数学与系统科学研究院 Distributed estimation method and system for privacy protection and readable storage medium
CN112214733B (en) * 2020-09-30 2022-06-21 中国科学院数学与系统科学研究院 Distributed estimation method and system for privacy protection and readable storage medium
CN112887095A (en) * 2021-01-26 2021-06-01 浙江工商大学 Block chain-based data privacy protection aggregation method for smart grid secondary network

Similar Documents

Publication Publication Date Title
CN103825743A (en) Data security aggregation method with privacy protection function
Sciancalepore et al. Key management protocol with implicit certificates for IoT systems
CN103702326B (en) A kind of Certificateless key agreement method based on mobile Ad Hoc network
Sharma et al. Secure data transmission on MANET by hybrid cryptography technique
CN101399660B (en) Method and device for negotiating group cipher
Chen et al. An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systems
Pothumarti et al. A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
Nabeel et al. Scalable end-to-end security for advanced metering infrastructures
WO2013060158A1 (en) Key update method and system of sensor node
CN102547694A (en) Chinese-remainder-theorem-based group key creation method for sensor network
Yüksel et al. Zigbee-2007 security essentials
Boujelben et al. IKM-An Identity based Key Management Scheme for Heterogeneous Sensor Networks.
CN103825742A (en) Authentication key agreement method applicable to large-scale sensor network
Xing et al. An improved secure key management scheme for LoRa system
CN109995516A (en) A kind of data safety polymerization with privacy protection function
Al-alak et al. Aes and ecc mixed for zigbee wireless sensor security
Bao et al. A key management scheme based on grouping within cluster
Yang et al. Establishing authenticated pairwise key using Pairing-based Cryptography for sensor networks
CN105207781A (en) Novel-system wireless sensor network encryption algorithm
Yu The scheme of public key infrastructure for improving wireless sensor networks security
CN106953727A (en) Based on the group safety certifying method without certificate in D2D communications
CN1917422A (en) Implementation method for reducing amount of calculation for managing cipher key of MANET network
Sun et al. A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree.
Lin et al. The secure vehicle-to-vehicle and vehicle-to-group communication mechanisms in smart city
Hu A hierarchical key management scheme for wireless sensor networks based on identity-based encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140528