Energy-efficient cluster-based privacy data aggregation for wireless sensor networks
MAN Dapeng1, WANG Chenye2, YANG Wu1, WANG Wei1, XUAN Shichang1, JIN Xiaopeng1
1. Information Security Research Center, Harbin Engineering University, Harbin 150001, China;
2. National Science Park of Harbin Engineering University, Harbin 150001, China
Abstract:Current privacy-preserving data aggregation methods in wireless sensor networks often have large computational and communication costs. This paper presents an energy-efficient cluster-based privacy data aggregation (E-CPDA) mechanism based on the cluster-based privacy data aggregation (CPDA) method. In each round of aggregation, the cluster head chooses a node as a collaborative node for the aggregation, which reduces the computational and communication costs between the nodes in one cluster. Simulations show that E-CPDA has less communication and computational costs with good privacy-preserving performance and higher accuracy than CPDA.
苘大鹏, 王臣业, 杨武, 王巍, 玄世昌, 靳小鹏. 低能耗的无线传感器网络隐私数据融合方法[J]. 清华大学学报(自然科学版), 2017, 57(2): 213-219.
MAN Dapeng, WANG Chenye, YANG Wu, WANG Wei, XUAN Shichang, JIN Xiaopeng. Energy-efficient cluster-based privacy data aggregation for wireless sensor networks. Journal of Tsinghua University(Science and Technology), 2017, 57(2): 213-219.
LI Na, ZHANG Nan, Das S K, et al. Privacy-preserving in wireless sensor networks:A state-of-the-art survey[J]. Ad Hoc Networks, 2009, 7(8):1501-1514.
[2]
Ozdemir S, XIAO Yang. Secure data aggregation in wireless sensor networks:A comprehensive overview[J]. Computer Networks, 2009, 53(12):2022-2037.
[3]
范永健, 陈红. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012, 35(6):1131-1146.FAN Yongjian, CHEN Hong. Data privacy preservation in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(6):1131-1146. (in Chinese)
[4]
HE Wenbo, LIU Xue, Nguyen H, et al. PDA:Privacy-preserving data aggregation in wireless sensor networks[C]//Proc 26th IEEE International Conference on Computer Communications. Anchorage, AK, USA:IEEE Press, 2007:2045-2053.
[5]
Bista R, Jo K J. A new approach to secure aggregation of private data in wireless sensor networks[C]//Proc 8th IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu, China:IEEE Press, 2009:394-399.
[6]
WANG Fushun, WANG Bin, SUN Xiaohua. Data merging method by protecting energy in wireless sensor networks[J]. Journal of Networks, 2014, 9(6):1558-1564.
[7]
LI Li, QIN Qin, LI Hua, et al. Data fusion algorithm of privacy protection based on QoS and multilayers hierarchically[J]. International Journal of Distributed Sensor Networks, 2013, 2013, 926038.
[8]
LI Hongjuan, LIN Kai, LI Keqiu. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communication, 2010, 34(4):591-597.
[9]
杨庚, 王安琪, 陈正宇, 等. 一种低能耗的数据融合隐私保护算法[J]. 计算机学报, 2011, 34(5):792-800.YANG Geng, WANG Anqi, CHEN Zhengyu, et al. An energy-saving privacy-preserving data aggregation algorithm[J]. Chinese Journal of Computers, 2011, 34(5):792-800. (in Chinese)
[10]
杨庚, 李森, 陈正宇, 等. 传感器网络中面向隐私保护的高精度数据融合算法[J]. 计算机学报, 2013, 36(1):189-200.YANG Geng, LI Sen, CHEN Zhengyu, et al. High-accuracy and privacy-preserving oriented data aggregation algorithm in sensor networks[J]. Chinese Journal of Computers, 2013, 36(1):189-200. (in Chinese)
[11]
YAO Jianbo, WEN Guangjun. Protecting classification privacy data aggregation in wireless sensor networks[C]//Proc 4th International Conference on Wireless Communication, Networking and Mobile Computing, WiCOM. Dalian, China:IEEE Press, 2008:1-5.
[12]
GUO Hongzhi. A modified scheme for privacy-preserving data aggregation in WSNs[C]//Proc 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). Yichang, China:IEEE Press, 2012:790-794.
[13]
Ukil A, Sen J. Secure multiparty privacy preserving data aggregation by modular arithmetic[C]//Proc 1st International Conference on Parallel, Distributed, and Grid Computing. Solan, India:IEEE Press, 2010:329-334.
[14]
Goldreich O. Secure Multi-Party Computation, Working Draft[Z/OL]. Version 1.4 (2002-10-27)[2015-10-23]. http://www.wisdom.weizmann.ac.il/~oded/PSX/prot.pdf.
[15]
Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//Proc 9th ACM Conference on Computer and Communications Security. Washington DC, USA:ACM Press, 2002:41-47.