检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:田洪亮 王佳玥 李晨曦[1] TIAN Hongliang;WANG Jiayue;LI Chenxi(School of Electrical Engineering,Northeast Electric Power University,Jilin Jilin 132012,China)
机构地区:[1]东北电力大学电气工程学院,吉林吉林132012
出 处:《计算机应用》2022年第8期2481-2486,共6页journal of Computer Applications
摘 要:为了增强云数据存储的完整性和安全性,在无线传感器网络(WSN)中,提出一种基于混合算法区块链的数据存储方案,以及一种集成身份验证和隐私保护的去中心化框架。首先,簇头将采集到的信息传递至基站,而基站在分布式区块链上记录所有关键参数,并传递至云端存储。然后,为了获得更高的安全等级,合并椭圆曲线加密(ECC)的160位密钥与高级加密标准(AES)的128位密钥,并在云存储层之间进行密钥对交换。基于混合算法的区块链结合身份验证方案可以很好地保证云数据的安全性存储,因此所提方案在安全性方面较为优秀。此外,恶意节点可通过基站从区块链中直接移除并撤销认证,方便快捷。仿真结果表明,与去中心化的区块链信息管理(BIM)方案、基于信任和分布式区块链评估的安全定位(DBE)算法和利用密钥衍生加密和数据分析(KDE-DA)管理方案相比,所提方案在延迟、吞吐量、计算开销方面具有一定的优越性。To enhance the integrity and security of cloud data storage,a data storage scheme based on hybrid algorithm blockchain and a decentralized framework integrating identity authentication and privacy protection were proposed in Wireless Sensor Network(WSN).Firstly,the collected information was transmitted to the base station by the cluster heads,and all the key parameters were recorded on the distributed blockchain and transmitted to the cloud storage by the base station.Then,in order to obtain a higher security level,the 160-bit key of Elliptic Curve Cryptography(ECC)and the 128-bit key of Advanced Encryption Standard(AES)were combined,and the key pairs were exchanged between the cloud storage layers.The proposed blockchain is based on a hybrid algorithm and combined with an identity verification scheme,which can well ensure the secure storage of cloud data,thus achieving excellent security.In addition,malicious nodes were able to be directly removed from the blockchain and also their authentication was able to be revoked through the base stations.And this operation is convenient and fast.Simulation results show that compared with schemes of decentralized Blockchain Information Management(BIM)scheme,secure localization algorithm based on trust and Decentralized Blockchain Evaluation(DBE)and Key Derivation Encryption and Data Analysis(KDE-DA)management scheme,the proposed scheme has some advantages in delay,throughput and computational overhead.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:52.15.60.240