基于Merkle哈希树的范围查询验证技术
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Range query integrity verification based on Merkle hash tree
  • 作者:赵蒙 ; 王雷 ; 匡林爱 ; 叶松涛 ; 刘栋
  • 英文作者:Zhao Meng;Wang Lei;Kuang Linai;Ye Songtao;Liu Dong;College of Information Engineering,Xiangtan University;Key Laboratory of Intelligent Computing and Information Processing;
  • 关键词:无线传感器网络 ; 范围查询 ; 完整性验证 ; Merkle哈希树 ; 签名
  • 英文关键词:wireless sensor network;;range query;;integrity preserving;;Merkle hash tree;;signature
  • 中文刊名:DNDX
  • 英文刊名:Journal of Southeast University(Natural Science Edition)
  • 机构:湘潭大学信息工程学院;湖南省湘潭大学智能计算与信息处理教育部重点实验室;
  • 出版日期:2017-11-20
  • 出版单位:东南大学学报(自然科学版)
  • 年:2017
  • 期:v.47
  • 基金:赛尔网络下一代互联网技术创新资助项目(NGII20160305);; 湖南省重点学科建设资助项目;; 国家自然科学基金资助项目(61640210,61672447);; 湘潭大学“产学研提质专项”资金支持资助项目(11KZ|KZ03051);; 湖南省物联网学会华为基金资助项目(KH01116);; 湘潭大学第九批教学改革研究资助项目(2904101)
  • 语种:中文;
  • 页:DNDX2017S1024
  • 页数:5
  • CN:S1
  • ISSN:32-1178/N
  • 分类号:122-126
摘要
由于目前在两层传感器网络中的范围查询验证技术主要基于Merkle哈希树,存在验证对象大、验证过程冗余、安全性低等问题,提出一种新颖的基于Merkle哈希树数据完整性验证方案.该方案采用部分物化的思想优化哈希树模型,首先将叶子节点分为若干组,每组构建一棵子哈希树,这些子哈希树构成第1层子树,并且只对第1层子树的根节点签名;然后按照同样的方法,将第1层子树签名的根节点分为若干组,形成第2层子树.以此类推,直到最后只有一颗哈希树为止;最后,基站通过部分签名的根节点便可验证查询结果的真实性.实验结果表明,该方案可以增强哈希树的抗攻击性,提高查询结果的验证速度,降低各节点计算hash值的复杂度.
        Due to that the current range query verification technique in the two-layer sensor network is mainly based on the Merkle hash tree,which has disadvantages of large verification object,redundant verification procedures and low security,a novel data integrity verification scheme based on Merkle hash tree is proposed. To optimize the hash tree model,the partial materialization theory is adopted in the scheme. First,all of the leaf nodes are divided into several groups and each group constructs a hash subtree. All the hash trees are collectively called the first layer subtree,only the root node of which is signed. Secondly,in the same way,the signed root nodes of the first layer subtree are divided into several groups forming the second layer subtree,and there exists only one hash tree at the end. Finally,the authenticity of query results is verified by the base station according to partially signed root nodes. The experimental results show that the proposed method can enhance the robustness of hash tree and improve the verification speed of query results,and reduce the computational complexity for calculating hash value of each node.
引文
[1]崔莉,鞠海玲,苗勇,等.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174.Cui Li,Ju Hailing,Miao Yong,et al.Overview of wireless sensor network[J].Journal of Computer Research and Development,2005,42(1):163-174.(in Chinese)
    [2]Laffey D,Buckley J,O'Flynn B.The development of environmentally tested antennas for wireless sensor networks[C]//Proceedings of the 4th Workshop on Embedded Networked Sensors-EmNets'07.Cork,Ireland,2007:73-77.
    [3]范永健,陈红.两层传感器网络中可验证隐私保护Top-k查询协议[J].计算机学报,2012,35(3):423-433.DOI:10.3724/SP.J.1016.2012.00423.Fan Yongjian,Chen Hong.Verifiable privacy-preserving Top-k query protocol in two-tiered sensor networks[J].Chinese Journal of Computers,2012,35(3):423-433.DOI:10.3724/SP.J.1016.2012.00423.(in Chinese)
    [4]戴华,杨庚,秦小麟,等.面向隐私保护的两层传感网Top-k查询处理方法[J].计算机研究与发展,2013,50(6):1239-1252Dai Hua,Yang Geng,Qin Xiaolin,et al.Privacy-preserving Top-k query processing in two tiered wireless sensor networks[J].Journal of Computer Research and Development,2013,50(6):1239-1252.(in Chinese)
    [5]李睿,林亚平,易叶青,等.两层传感器网络中安全top-k查询协议[J].计算机研究与发展,2012,49(9):1947-1958Li Rui,Lin Yaping,Yi Yeqing,et al.A secure top-k query protocol in two-tiered sensor networks[J].Journal of Computer Research and Development,2012,49(9):1947-1958.(in Chinese)
    [6]Sheng B,Li Q.Verifiable privacy-preserving sensor network storage for range query[J].IEEE Transactions on Mobile Computing,2011,10(9):1312-1326.DOI:10.1109/tmc.2010.236.
    [7]Shi J,Zhang R,Zhang Y.A spatiotemporal approach for secure range queries in tiered sensor networks[J].IEEE Transactions on Wireless Communications,2011,10(1):264-273.DOI:10.1109/twc.2010.102210.100548.
    [8]Chen F,Liu A X.Privacy-and integrity-preserving range queries in sensor networks[J].IEEE/ACMTransactions on Networking,2012,20(6):1774-1787.DOI:10.1109/tnet.2012.2188540.
    [9]张晓莹,董蕾,陈红.无线传感器网络隐私保护范围查询处理技术[J].华东师范大学学报(自然科学版),2015(5):1-13.DOI:10.3969/j.issn.1000-5641.2015.05.001.Zhang Xiaoying,Dong Lei,Chen Hong.Privacy-preserving range query processing in wireless sensor networks[J].Journal of East China Normal University(Natural Science),2015(5):1-13.DOI:10.3969/j.issn.1000-5641.2015.05.001.(in Chinese)
    [10]Mouratidis K,Sacharidis D,Pang H.Partially materialized digest scheme:an efficient verification method for outsourced databases[J].The VLDB Journal,2009,18(1):363-381 DOI:10.1007/s00778-008-0108-z.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700