BibTex RIS Kaynak Göster

KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME

Yıl 2008, Cilt: 23 Sayı: 2, 0 - , 18.02.2013

Öz

Artık veri aktarımını önlemek ve istenilen bilgiyi özetleyebilmek için Kablosuz Algılayıcı Ağlarında (KAA) veri kümeleme vazgeçilmez bir ihtiyaçtır. Genelde saldırılara açık ortamlarda kullanılmaları sebebiyle KAA’lar için bir başka önemli gereklilikte ağ üzerinde taşınan verinin gizliliğinin sağlanmasıdır. Ancak geleneksel veri kümeleme protokollerinde veri kümeleme işlemi sırasında veri gizliliğini sağlamak mümkün değildir. Bu çalışmada literatürdeki veri kümeleme teknikleri incelenip bunların veri gizliliğini sağlayan güvenlik algoritmaları ile olan ilişkileri incelenmiştir. Buna ek olarak homomorfik şifrelemeye dayanan yeni ve orijinal bir güvenli veri kümeleme protokolü sunulmuştur. Geliştirilen protokolde homomorfik şifreleme tekniği kullanılarak şifrelenmiş veriler üzerinden veri kümeleme yapmak mümkündür ve bunun sonucu olarakta kümeleme işlemi sırasında veri gizliliği sağlanabilmektedir.

Kaynakça

  • Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.,
  • Cayirci, E., “A survey on sensor networks”,
  • IEEE Communications Magazine, 40(8), 102-
  • , 2002.
  • Intanagonwiwat, C., Estrin, D., Govindan, R.,
  • Heidemann, J., Impact of network density on
  • Data Aggregation in wireless sensor networks,
  • nd International Conference on Distributed
  • Computing Systems, 575-578, 2002.
  • Fan, K.W., Liu, S., Sinha, P., Structure-free Data
  • Aggregation in Sensor Networks, IEEE
  • Transactions on Mobile Computing, 6(8), 929-
  • , 2007.
  • Cam, H., Ozdemir, S., Nair, P.,
  • Muthuavinashiappan, D., Sanli, H.O., Energy-
  • Efficient and secure pattern based data
  • aggregation for wireless sensor networks, Special
  • Issue of Computer Communications on Sensor
  • Networks, 446-455, 2006.
  • Lee, S., Chung, T., Data Aggregation for
  • Wireless Sensor Networks Using Self organizing
  • Map, Artificial Intelligence and Simulation, V.
  • , 508-517, 2005.
  • Intanagonwiwat, C., Govindan, R., Estrin, D.,
  • Heidemann, J., Silva, F., Directed Diffusion for
  • Wireless Sensor Networking, IEEE/ACM
  • Transactions on Networking, vol.11, no. 1, 2-
  • , 2003.
  • Lindsey, S., Raghavendra, C.S., PEGASIS:
  • Power Efficient Gathering in Sensor Information
  • Systems, IEEE Aerospace Conference, 1125-
  • , 2002.
  • Madden, S.R., Franklin, M.J., Hellerstein, J.M.,
  • Hong, W., TAG: tiny aggregation service for adhoc
  • sensor networks, The 5th symposium on
  • Operating systems design and implementation,
  • -146, 2002.
  • Heinzelman, W., Chandrakasan, A.,
  • Balakrishnan, H., Energy-Efficient
  • Communication Protocol for Wireless Micro
  • Sensor Networks, The 33rd Hawaii
  • International Conference on System Sciences,
  • -10, 2000.
  • Heinzelman, W., Kulik, J., Balakrishnan, H.,
  • Adaptive Protocols for Information
  • Dissemination in Wireless Sensor Networks, The
  • th ACM/IEEE Mobicom Conference, 1999.
  • Hu, L., Evans, D., Secure aggregation for
  • wireless networks, Workshop on Security and
  • Assurance in Ad hoc Networks, 384-392, 2003.
  • Przydatek, B., Song, D. Perrig, A., SIA : Secure
  • information aggregation in sensor networks,
  • SenSys’03, 255 – 265, 2003.
  • Merkle, R.C., Protocols for public key
  • cryptosystems, IEEE Symposium on Research
  • in Security and Privacy, 122-134,1980.
  • Cam, H., Ozdemir, S., Sanli, H.O., Nair, P.,
  • Secure differential data aggregation for wireless
  • sensor networks, Sensor Network Operations,
  • Editor: Phoha, S., La Porta, T.F., Griffin, C.,
  • Wiley-IEEE Press, 422-442, April 2006.
  • Girao, J., Westhoff, D., Schneider,
  • M., Concealed Data Aggregation for Reverse
  • Multicast Traffic in Sensor Networks:
  • Encryption, Key Distribution, and Routing
  • Adaptation. IEEE Transactions on Mobile
  • Computing, 1417-1431, 2006.
  • Domingo-Ferrer, J., A provably secure additive
  • and multiplicative privacy homomorphism,
  • Information Security Conference, LNCS 2433,
  • -483, 2002.
  • Okamoto, T., Uchiyama, S., A new Public-Key
  • Cryptosystem as Secure as Factoring, Advances
  • in Cryptology - EUROCRYPT’98, 208-318,
  • -
  • Mica2 Motes, Crossbow Technologies Inc.,
  • http://www.xbow.com.
  • Seetharam, D., Rhee, S., An efficient pseudo
  • random number generator for low-power sensor
  • networks, 29th Annual IEEE International
  • Conference on Local Computer Networks,
  • -562, 2004.
  • Law, Y. W., Doumen, J., Hartel, P., Survey and
  • benchmark of block ciphers for wireless sensor
  • networks, ACM Transactions on Sensor
  • Networks, 65-93, 2006.
  • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.,
  • A concrete security treatment of symmetric
  • encryption. IEEE Symposium on Foundations
  • of Computer Science, 394–403, 1997.
  • Liu, D., Ning, P., Establishing pairwise keys in
  • distributed sensor networks, 10th ACM
  • Conference on Computer and
  • Communications Security (CCS), 52-61, 2003.
  • Perrig, A., Szewczyk, R., Tygar, D., Wen, V.,
  • Culler, D., SPINS: Security protocols for sensor
  • networks, Wireless Networks Journal (WINE),
  • -534, 2002.
  • Castelluccia, C., Mykletun, E., Tsudik, G.,
  • "Efficient aggregation of encrypted data in
  • wireless sensor networks," Conference on
  • Mobile and Ubiquitous Systems: Networking
  • and Services, vol., no., pp. 109-117, 2005.
  • QualNet Network Simulator by Scalable
  • Network Technologies., www.scalablenetworks.
  • com/
  • Heinzelman, W. R., Chandrakasan, A. and
  • Balakrishnan, H. “An Application-Specific
  • Protocol Architecture for Wireless Microsensor
  • Networks,” IEEE Transactions on Wireless
  • Communications, vol. 1, no. 4, pp. 660–670,
  • October 2002.
Yıl 2008, Cilt: 23 Sayı: 2, 0 - , 18.02.2013

Öz

Kaynakça

  • Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.,
  • Cayirci, E., “A survey on sensor networks”,
  • IEEE Communications Magazine, 40(8), 102-
  • , 2002.
  • Intanagonwiwat, C., Estrin, D., Govindan, R.,
  • Heidemann, J., Impact of network density on
  • Data Aggregation in wireless sensor networks,
  • nd International Conference on Distributed
  • Computing Systems, 575-578, 2002.
  • Fan, K.W., Liu, S., Sinha, P., Structure-free Data
  • Aggregation in Sensor Networks, IEEE
  • Transactions on Mobile Computing, 6(8), 929-
  • , 2007.
  • Cam, H., Ozdemir, S., Nair, P.,
  • Muthuavinashiappan, D., Sanli, H.O., Energy-
  • Efficient and secure pattern based data
  • aggregation for wireless sensor networks, Special
  • Issue of Computer Communications on Sensor
  • Networks, 446-455, 2006.
  • Lee, S., Chung, T., Data Aggregation for
  • Wireless Sensor Networks Using Self organizing
  • Map, Artificial Intelligence and Simulation, V.
  • , 508-517, 2005.
  • Intanagonwiwat, C., Govindan, R., Estrin, D.,
  • Heidemann, J., Silva, F., Directed Diffusion for
  • Wireless Sensor Networking, IEEE/ACM
  • Transactions on Networking, vol.11, no. 1, 2-
  • , 2003.
  • Lindsey, S., Raghavendra, C.S., PEGASIS:
  • Power Efficient Gathering in Sensor Information
  • Systems, IEEE Aerospace Conference, 1125-
  • , 2002.
  • Madden, S.R., Franklin, M.J., Hellerstein, J.M.,
  • Hong, W., TAG: tiny aggregation service for adhoc
  • sensor networks, The 5th symposium on
  • Operating systems design and implementation,
  • -146, 2002.
  • Heinzelman, W., Chandrakasan, A.,
  • Balakrishnan, H., Energy-Efficient
  • Communication Protocol for Wireless Micro
  • Sensor Networks, The 33rd Hawaii
  • International Conference on System Sciences,
  • -10, 2000.
  • Heinzelman, W., Kulik, J., Balakrishnan, H.,
  • Adaptive Protocols for Information
  • Dissemination in Wireless Sensor Networks, The
  • th ACM/IEEE Mobicom Conference, 1999.
  • Hu, L., Evans, D., Secure aggregation for
  • wireless networks, Workshop on Security and
  • Assurance in Ad hoc Networks, 384-392, 2003.
  • Przydatek, B., Song, D. Perrig, A., SIA : Secure
  • information aggregation in sensor networks,
  • SenSys’03, 255 – 265, 2003.
  • Merkle, R.C., Protocols for public key
  • cryptosystems, IEEE Symposium on Research
  • in Security and Privacy, 122-134,1980.
  • Cam, H., Ozdemir, S., Sanli, H.O., Nair, P.,
  • Secure differential data aggregation for wireless
  • sensor networks, Sensor Network Operations,
  • Editor: Phoha, S., La Porta, T.F., Griffin, C.,
  • Wiley-IEEE Press, 422-442, April 2006.
  • Girao, J., Westhoff, D., Schneider,
  • M., Concealed Data Aggregation for Reverse
  • Multicast Traffic in Sensor Networks:
  • Encryption, Key Distribution, and Routing
  • Adaptation. IEEE Transactions on Mobile
  • Computing, 1417-1431, 2006.
  • Domingo-Ferrer, J., A provably secure additive
  • and multiplicative privacy homomorphism,
  • Information Security Conference, LNCS 2433,
  • -483, 2002.
  • Okamoto, T., Uchiyama, S., A new Public-Key
  • Cryptosystem as Secure as Factoring, Advances
  • in Cryptology - EUROCRYPT’98, 208-318,
  • -
  • Mica2 Motes, Crossbow Technologies Inc.,
  • http://www.xbow.com.
  • Seetharam, D., Rhee, S., An efficient pseudo
  • random number generator for low-power sensor
  • networks, 29th Annual IEEE International
  • Conference on Local Computer Networks,
  • -562, 2004.
  • Law, Y. W., Doumen, J., Hartel, P., Survey and
  • benchmark of block ciphers for wireless sensor
  • networks, ACM Transactions on Sensor
  • Networks, 65-93, 2006.
  • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.,
  • A concrete security treatment of symmetric
  • encryption. IEEE Symposium on Foundations
  • of Computer Science, 394–403, 1997.
  • Liu, D., Ning, P., Establishing pairwise keys in
  • distributed sensor networks, 10th ACM
  • Conference on Computer and
  • Communications Security (CCS), 52-61, 2003.
  • Perrig, A., Szewczyk, R., Tygar, D., Wen, V.,
  • Culler, D., SPINS: Security protocols for sensor
  • networks, Wireless Networks Journal (WINE),
  • -534, 2002.
  • Castelluccia, C., Mykletun, E., Tsudik, G.,
  • "Efficient aggregation of encrypted data in
  • wireless sensor networks," Conference on
  • Mobile and Ubiquitous Systems: Networking
  • and Services, vol., no., pp. 109-117, 2005.
  • QualNet Network Simulator by Scalable
  • Network Technologies., www.scalablenetworks.
  • com/
  • Heinzelman, W. R., Chandrakasan, A. and
  • Balakrishnan, H. “An Application-Specific
  • Protocol Architecture for Wireless Microsensor
  • Networks,” IEEE Transactions on Wireless
  • Communications, vol. 1, no. 4, pp. 660–670,
  • October 2002.
Toplam 112 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Bölüm Makaleler
Yazarlar

Suat Özdemir Bu kişi benim

Yayımlanma Tarihi 18 Şubat 2013
Gönderilme Tarihi 18 Şubat 2013
Yayımlandığı Sayı Yıl 2008 Cilt: 23 Sayı: 2

Kaynak Göster

APA Özdemir, S. (2013). KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, 23(2).
AMA Özdemir S. KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME. GUMMFD. Mart 2013;23(2).
Chicago Özdemir, Suat. “KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME”. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 23, sy. 2 (Mart 2013).
EndNote Özdemir S (01 Mart 2013) KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 23 2
IEEE S. Özdemir, “KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME”, GUMMFD, c. 23, sy. 2, 2013.
ISNAD Özdemir, Suat. “KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME”. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 23/2 (Mart 2013).
JAMA Özdemir S. KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME. GUMMFD. 2013;23.
MLA Özdemir, Suat. “KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME”. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, c. 23, sy. 2, 2013.
Vancouver Özdemir S. KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME. GUMMFD. 2013;23(2).