Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme

Article Preview

Abstract:

The Internet of things is widespread concerned by the whole society now. As an important component of the Internet of things, wireless sensor network has wide application prospect in various fields such as medical and health, military defense. The traditional data privacy protection technology of PKI system used in the WSN networks has its own weakness. This paper presents the secret key sharing mechanism to protect data privacy. The secret key, remote node and base station used to communicate, was divided into multiple secrets. The multiple secrets were distributed in the nodes which connect directly to the base station node. Only through collect more than threshold number of multi-secret that can decrypt the communication data between the base station and the remote node. To be safer, we used digital watermarking technology to protect the data transmission between the base station and the aggregate node. These techniques combined with the data slice, homomorphism encryption technology to protect data privacy, construct a safe and efficient wireless sensor networks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

141-144

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Limin Sun, Jianzhong Li, Yu Chen. Wireless Sensor Networks. Tsinghua University Press, 2005(In Chinese).

Google Scholar

[2] YouSheng Zhou, Feng Wang, ShiHan Qing. Dynamic Multi-secret Sharing Scheme Based on Cellular Automata. Chinese Journal of Computers, 2012, Vol. 49(9): 1999-(2004).

Google Scholar

[3] Harn L. Multistage secret sharing based on one-way function [J]. Electronics Letters, 1995, Vol. 31(4): 262-265.

DOI: 10.1049/el:19950201

Google Scholar

[4] Fengyuan Ren, Haining Huang, Chuang Lin. Wireless Sensor Network. Journal of Software, 2003, Vol. 14(7): 1282-1291(In Chinese).

Google Scholar

[5] Rosen E, Viswanathan A, Callon R. Multiprotocol label switching architecture. IETF RFC3031, (2001).

DOI: 10.17487/rfc3031

Google Scholar

[6] Shamir A. How to share a secret. Communications of the ACM, 1979, Vol. 22(11): 612-613.

DOI: 10.1145/359168.359176

Google Scholar