Data fusion protocol with source security for sensor networks

For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the p...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Peng, YU Jian-ping, LIU Hong-wei
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74645539/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537746365054976
author ZHANG Peng
YU Jian-ping
LIU Hong-wei
author_facet ZHANG Peng
YU Jian-ping
LIU Hong-wei
author_sort ZHANG Peng
collection DOAJ
description For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the proposed signature scheme is secure based on the CDH assumption,and the proposed protocol can provide the collected data end-to-end confidentiality and authentication.
format Article
id doaj-art-b4c95e409310442e8279b015aa2a7d96
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b4c95e409310442e8279b015aa2a7d962025-01-14T08:24:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131879174645539Data fusion protocol with source security for sensor networksZHANG PengYU Jian-pingLIU Hong-weiFor the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the proposed signature scheme is secure based on the CDH assumption,and the proposed protocol can provide the collected data end-to-end confidentiality and authentication.http://www.joconline.com.cn/zh/article/74645539/sensor networkssource securitydata fusionend-to-end confidentialityend-to-end authentication
spellingShingle ZHANG Peng
YU Jian-ping
LIU Hong-wei
Data fusion protocol with source security for sensor networks
Tongxin xuebao
sensor networks
source security
data fusion
end-to-end confidentiality
end-to-end authentication
title Data fusion protocol with source security for sensor networks
title_full Data fusion protocol with source security for sensor networks
title_fullStr Data fusion protocol with source security for sensor networks
title_full_unstemmed Data fusion protocol with source security for sensor networks
title_short Data fusion protocol with source security for sensor networks
title_sort data fusion protocol with source security for sensor networks
topic sensor networks
source security
data fusion
end-to-end confidentiality
end-to-end authentication
url http://www.joconline.com.cn/zh/article/74645539/
work_keys_str_mv AT zhangpeng datafusionprotocolwithsourcesecurityforsensornetworks
AT yujianping datafusionprotocolwithsourcesecurityforsensornetworks
AT liuhongwei datafusionprotocolwithsourcesecurityforsensornetworks