全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Data Fusion Algorithm of Privacy Protection Based on Qos and Multilayers Hierarchically

DOI: 10.1155/2013/926038

Full-Text   Cite this paper   Add to My Lib

Abstract:

Because of the special nature of wireless sensor networks, data fusion process is vulnerable to attacks by the destroyer, which is useful for reducing the network communication overhead and improving the data transmission efficiency. Therefore, it is very essential to provide transmission with high security and low energy consumption for sensitive data fusion in wireless sensor network. In this paper, a data fusion algorithm of privacy protection based on Query of Server (Qos) and hierarchical multilayers was put forward, which divided the required privacy protection levels according to different safety requirements, and set up hierarchical network models. In data fusion process, delay constraint was added to guarantee service quality of Qos, and this would reduce energy consumption overhead. Meanwhile, it would guarantee the accuracy of the data and reduce the probability of the whole network information exposed. 1. Introduction Wireless sensor network (WSN) data fusion technique has broad application prospects, which is one of the key technologies in the internet of things. Data fusion technology is the process of processing multiple copies of data and it gets more effective data to users. But wireless sensor network is vulnerable to various attacks for its open and self-organizing features. The fusion data attacks may cause bad results, which not only makes the wireless sensor network lose the original construction objective but also may cause much more damage. Therefore, it is very necessary to provide transmission of security and low energy consumption for sensitive data fusion in wireless sensor network. Currently, data fusion safe programs can be divided into two kinds. One is the program based on data integrity, and the other is data confidentiality [1]. In traditional ways, Hop-by-hop encryption is the main way to protect the confidentiality [2]. The confidentiality of end-to-end and authentication of data fusion technology are the two main goals of safety data fusion protocol [3]. Data security in sensor networks fusion scheme was proposed in the paper in [4], and secure data fusion in wireless sensor network was proposed based on the homomorphic MAC in [5] by Wei et al. The security of data fusion was studied by both of them in wireless sensor network [4, 5]. However, security will increase the resource cost and reduce the efficiency improved by data fusion mechanism. Therefore, when the effective security of data fusion, calculation, and transmission was set up, resource consumption should be reduced as little as possible, and network life

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133