Kablosuz Çoklu Ortam Algılayıcı Ağlarında Damgalama İle Güvenli Veri Kümeleme
Yıl 2013,
Cilt: 28 Sayı: 3, 0 - , 05.03.2014
Ersin Elbaşı
Suat Özdemir
Öz
Kablosuz Çoklu ortam Algılayıcı Ağları (KÇAA) birden çok algılayıcı ünitesine sahip algılayıcı düğümlerinin oluşturduğu ısı, nem v.b. basit veriler dışında video ve fotoğraf gibi verilerin de toplanabildiği bilgi toplama ağlardır. KÇAA’lar genellikle askeri yada sivil izleme/takip uygulamalarında kullanıldıkları için bu ağlarda güvenliğin sağlanması bir zorunluluktur. Geleneksel kablosuz algılayıcı ağlarında olduğu gibi, KÇAA’ları oluşturan algılayıcı düğümleri de enerji ve bantgenişliği açısından oldukça kısıtlıdır. Bu nedenle KÇAA’larda veri toplama işlemi hem güvenli hem de enerji etkin bir şekilde yapılmak zorundadır. Bu çalışmada KÇAA’larda veri toplama işlemini güvenli ve enerji etkin hale getirecek sayısal damgalama tabanlı veri kümeleme protokolü geliştirilmiştir. Geliştirilen protokolde algılayıcılar gizlemek istedikleri verileri fotoğraf verisi içine saldırılara karşı dayanıklı bir algoritma ile gömmekte ve bu damgalanmış veriler ise veri kümeleyiciler tarafından kümelenmektedir. Performans analizi ve benzetim çalışmaları, önerilen sistemin güvenli veri kümeleme sağlarken veri iletim miktarında da azalmaya neden olduğunu göstermektedir.
Kaynakça
- Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. ve Cayirci, E., “A survey on sensor networks”, IEEE Communications Magazine, Cilt 40, No 8, 102-114, 2002. 2. Ozdemir, S., and Xiao, Y., “Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview” Computer Networks, Cilt 53, No 12, 2022-2037, 2009.
- Akyildiz, I.F., Melodia, T. ve Chowdhury, K. R., “A survey on wireless multimedia sensor Networks”, Computer Networks, Cilt 51,No 4, 921-960, 2007.
- Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D. ve Sanli, H.O., “Energy-Efficient and secure pattern based data aggregation for wireless sensor Networks”, Computer Communications, Cilt 29, No 4, 446-455, 2006.
- Cam, H., Ozdemir, S., Nair, P. ve Muthuavinashiappan D., "ESPDA: Energy-Efficient and Secure Pattern-Based Data Aggregation for Wireless Sensor Networks", Proceding of IEEE Sensors Conference, Toronto, Canada, 2003.
- Lee, S. ve Chung, T., “Data Aggregation for Wireless Sensor Networks Using Self organizing Map”, Artificial Intelligence and Simulation, 508-517, 2005.
- Hu, L. ve Evans, D., “Secure aggregation for wireless Networks”, Workshop on Security and Assurance in Ad hoc Networks, 384-392, 2003.
- Przydatek, B., Song, D. ve Perrig, A., “SIA : Secure information aggregation in sensor Networks”, ACM Conference on Sensor Systems, 255 – 265, 2003.
- Girao, J., Westhoff, D. ve Schneider, M., “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation”, IEEE Transactions on Mobile Computing, 1417-1431, 2006.
- Domingo-Ferrer, J., “A provably secure additive and multiplicative privacy homomorphism”, Information Security Conference, Lecture Notes in Computer Science, 471-483, 2002.
- Ozdemir, S., “Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism”,International Conference on Pervasive Services, Istanbul, 2007.
- Castelluccia, C., Mykletun, E. ve Tsudik, G., “Efficient aggregation of encrypted data in wireless sensor Networks”, Conference on Mobile and Ubiquitous Systems: Networking and Services, 109-117, 2005.
- Ozdemir, S., “Secure Data Aggregation in Wireless Sensor Networks via Homomorphic Encryption”, Journal of The Faculty of Engineering and Architecture of Gazi University, Cilt 23,No 2,365-373, 2008. 14. Ozdemir S., ve Xiao, Y., "Integrity Protecting Hierarchical Concealed Data Aggregation for Wireless Sensor Networks", Computer Networks, Cilt 55, No 8, 1735-1746, 2011. 15. Ozdemir, S., Peng, M., ve Xiao, Y., “PRDA: Polynomial Regression Based Privacy Preserving Data Aggregation in Wireless Sensor Networks”, Wireless Communications and Mobile Computing, Wiley, DOI: 10.1002/wcm.2369, 2013. 16. Cox I. J., Kilian J., Leighton T. ve Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Cilt 6, No 12,1673-1687,1997. 17. Piva A., Barni M., Bartolini F. ve Cappellini F., “DCT-based Watermark Recovering without Resorting to the Uncorrupted Orijinal Image, International Conference on Image Processing, Washington, DC, USA,, 1997. 18. Dugad R., Ratakonda K., ve Ahuja N., “A New Wavelet-Based Scheme for Watermarking Images,” International Conference on Image Processing,419-423,Chicago, IL, 1998. 19. Zhu W., Xiong Z. ve Zhang Y.Z., “Multiresolution Watermarking for Images and Video,” IEEE Transactions on Circuits and Systems for Video Technology, Cilt 9, No 4, 545-550,1999. 20. Elbasi E. ve Eskicioglu A. M., “A DWT-based Robust Semi-blind Image Watermarking Algorithm Using Two Bands,” IS&T/SPIE’s 18th Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents Conference, San Jose, CA, 2006. 21. Elbasi E.,“Robust MPEG Watermarking in DWT Four Bands”, Journal of Applied Research and Technology, Cilt 10, No 2,87-93, 2012. 22. Huffman D.A., "A Method for the Construction of Minimum-Redundancy Codes", Proceedings of the I.R.E.,1098-1102, 1952. 23. Tiny OS Simulator. http://www.tinyos.net/. (Erişim Ocak 2012)
- Çakıroğlu, M., Özcerit, T., Özdemir, Ç., “Boğma Saldırılarına Karşı Dinamik Kanal Atlamalı Yeni bir Güvenlik Yönteminin Tasarımı ve Başarım Analizi”, Gazi Üniv. Müh. Mim. Fak. Der., Cilt 26, No 4, 877-887, 2011
Yıl 2013,
Cilt: 28 Sayı: 3, 0 - , 05.03.2014
Ersin Elbaşı
Suat Özdemir
Kaynakça
- Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. ve Cayirci, E., “A survey on sensor networks”, IEEE Communications Magazine, Cilt 40, No 8, 102-114, 2002. 2. Ozdemir, S., and Xiao, Y., “Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview” Computer Networks, Cilt 53, No 12, 2022-2037, 2009.
- Akyildiz, I.F., Melodia, T. ve Chowdhury, K. R., “A survey on wireless multimedia sensor Networks”, Computer Networks, Cilt 51,No 4, 921-960, 2007.
- Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D. ve Sanli, H.O., “Energy-Efficient and secure pattern based data aggregation for wireless sensor Networks”, Computer Communications, Cilt 29, No 4, 446-455, 2006.
- Cam, H., Ozdemir, S., Nair, P. ve Muthuavinashiappan D., "ESPDA: Energy-Efficient and Secure Pattern-Based Data Aggregation for Wireless Sensor Networks", Proceding of IEEE Sensors Conference, Toronto, Canada, 2003.
- Lee, S. ve Chung, T., “Data Aggregation for Wireless Sensor Networks Using Self organizing Map”, Artificial Intelligence and Simulation, 508-517, 2005.
- Hu, L. ve Evans, D., “Secure aggregation for wireless Networks”, Workshop on Security and Assurance in Ad hoc Networks, 384-392, 2003.
- Przydatek, B., Song, D. ve Perrig, A., “SIA : Secure information aggregation in sensor Networks”, ACM Conference on Sensor Systems, 255 – 265, 2003.
- Girao, J., Westhoff, D. ve Schneider, M., “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation”, IEEE Transactions on Mobile Computing, 1417-1431, 2006.
- Domingo-Ferrer, J., “A provably secure additive and multiplicative privacy homomorphism”, Information Security Conference, Lecture Notes in Computer Science, 471-483, 2002.
- Ozdemir, S., “Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism”,International Conference on Pervasive Services, Istanbul, 2007.
- Castelluccia, C., Mykletun, E. ve Tsudik, G., “Efficient aggregation of encrypted data in wireless sensor Networks”, Conference on Mobile and Ubiquitous Systems: Networking and Services, 109-117, 2005.
- Ozdemir, S., “Secure Data Aggregation in Wireless Sensor Networks via Homomorphic Encryption”, Journal of The Faculty of Engineering and Architecture of Gazi University, Cilt 23,No 2,365-373, 2008. 14. Ozdemir S., ve Xiao, Y., "Integrity Protecting Hierarchical Concealed Data Aggregation for Wireless Sensor Networks", Computer Networks, Cilt 55, No 8, 1735-1746, 2011. 15. Ozdemir, S., Peng, M., ve Xiao, Y., “PRDA: Polynomial Regression Based Privacy Preserving Data Aggregation in Wireless Sensor Networks”, Wireless Communications and Mobile Computing, Wiley, DOI: 10.1002/wcm.2369, 2013. 16. Cox I. J., Kilian J., Leighton T. ve Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Cilt 6, No 12,1673-1687,1997. 17. Piva A., Barni M., Bartolini F. ve Cappellini F., “DCT-based Watermark Recovering without Resorting to the Uncorrupted Orijinal Image, International Conference on Image Processing, Washington, DC, USA,, 1997. 18. Dugad R., Ratakonda K., ve Ahuja N., “A New Wavelet-Based Scheme for Watermarking Images,” International Conference on Image Processing,419-423,Chicago, IL, 1998. 19. Zhu W., Xiong Z. ve Zhang Y.Z., “Multiresolution Watermarking for Images and Video,” IEEE Transactions on Circuits and Systems for Video Technology, Cilt 9, No 4, 545-550,1999. 20. Elbasi E. ve Eskicioglu A. M., “A DWT-based Robust Semi-blind Image Watermarking Algorithm Using Two Bands,” IS&T/SPIE’s 18th Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents Conference, San Jose, CA, 2006. 21. Elbasi E.,“Robust MPEG Watermarking in DWT Four Bands”, Journal of Applied Research and Technology, Cilt 10, No 2,87-93, 2012. 22. Huffman D.A., "A Method for the Construction of Minimum-Redundancy Codes", Proceedings of the I.R.E.,1098-1102, 1952. 23. Tiny OS Simulator. http://www.tinyos.net/. (Erişim Ocak 2012)
- Çakıroğlu, M., Özcerit, T., Özdemir, Ç., “Boğma Saldırılarına Karşı Dinamik Kanal Atlamalı Yeni bir Güvenlik Yönteminin Tasarımı ve Başarım Analizi”, Gazi Üniv. Müh. Mim. Fak. Der., Cilt 26, No 4, 877-887, 2011