Data fusion protocol with source security for sensor networks
For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the p...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74645539/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537746365054976 |
---|---|
author | ZHANG Peng YU Jian-ping LIU Hong-wei |
author_facet | ZHANG Peng YU Jian-ping LIU Hong-wei |
author_sort | ZHANG Peng |
collection | DOAJ |
description | For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the proposed signature scheme is secure based on the CDH assumption,and the proposed protocol can provide the collected data end-to-end confidentiality and authentication. |
format | Article |
id | doaj-art-b4c95e409310442e8279b015aa2a7d96 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b4c95e409310442e8279b015aa2a7d962025-01-14T08:24:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131879174645539Data fusion protocol with source security for sensor networksZHANG PengYU Jian-pingLIU Hong-weiFor the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the proposed signature scheme is secure based on the CDH assumption,and the proposed protocol can provide the collected data end-to-end confidentiality and authentication.http://www.joconline.com.cn/zh/article/74645539/sensor networkssource securitydata fusionend-to-end confidentialityend-to-end authentication |
spellingShingle | ZHANG Peng YU Jian-ping LIU Hong-wei Data fusion protocol with source security for sensor networks Tongxin xuebao sensor networks source security data fusion end-to-end confidentiality end-to-end authentication |
title | Data fusion protocol with source security for sensor networks |
title_full | Data fusion protocol with source security for sensor networks |
title_fullStr | Data fusion protocol with source security for sensor networks |
title_full_unstemmed | Data fusion protocol with source security for sensor networks |
title_short | Data fusion protocol with source security for sensor networks |
title_sort | data fusion protocol with source security for sensor networks |
topic | sensor networks source security data fusion end-to-end confidentiality end-to-end authentication |
url | http://www.joconline.com.cn/zh/article/74645539/ |
work_keys_str_mv | AT zhangpeng datafusionprotocolwithsourcesecurityforsensornetworks AT yujianping datafusionprotocolwithsourcesecurityforsensornetworks AT liuhongwei datafusionprotocolwithsourcesecurityforsensornetworks |