INFORMATION ENGINEERING |
|
|
|
|
|
Energy-efficient cluster-based privacy data aggregation for wireless sensor networks |
MAN Dapeng1, WANG Chenye2, YANG Wu1, WANG Wei1, XUAN Shichang1, JIN Xiaopeng1 |
1. Information Security Research Center, Harbin Engineering University, Harbin 150001, China;
2. National Science Park of Harbin Engineering University, Harbin 150001, China |
|
|
Abstract Current privacy-preserving data aggregation methods in wireless sensor networks often have large computational and communication costs. This paper presents an energy-efficient cluster-based privacy data aggregation (E-CPDA) mechanism based on the cluster-based privacy data aggregation (CPDA) method. In each round of aggregation, the cluster head chooses a node as a collaborative node for the aggregation, which reduces the computational and communication costs between the nodes in one cluster. Simulations show that E-CPDA has less communication and computational costs with good privacy-preserving performance and higher accuracy than CPDA.
|
Keywords
wireless sensor network (WSN)
privacy preservation
data aggregation
|
|
Issue Date: 15 February 2017
|
|
|
[1] |
LI Na, ZHANG Nan, Das S K, et al. Privacy-preserving in wireless sensor networks:A state-of-the-art survey[J]. Ad Hoc Networks, 2009, 7(8):1501-1514.
|
[2] |
Ozdemir S, XIAO Yang. Secure data aggregation in wireless sensor networks:A comprehensive overview[J]. Computer Networks, 2009, 53(12):2022-2037.
|
[3] |
范永健, 陈红. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012, 35(6):1131-1146.FAN Yongjian, CHEN Hong. Data privacy preservation in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(6):1131-1146. (in Chinese)
|
[4] |
HE Wenbo, LIU Xue, Nguyen H, et al. PDA:Privacy-preserving data aggregation in wireless sensor networks[C]//Proc 26th IEEE International Conference on Computer Communications. Anchorage, AK, USA:IEEE Press, 2007:2045-2053.
|
[5] |
Bista R, Jo K J. A new approach to secure aggregation of private data in wireless sensor networks[C]//Proc 8th IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu, China:IEEE Press, 2009:394-399.
|
[6] |
WANG Fushun, WANG Bin, SUN Xiaohua. Data merging method by protecting energy in wireless sensor networks[J]. Journal of Networks, 2014, 9(6):1558-1564.
|
[7] |
LI Li, QIN Qin, LI Hua, et al. Data fusion algorithm of privacy protection based on QoS and multilayers hierarchically[J]. International Journal of Distributed Sensor Networks, 2013, 2013, 926038.
|
[8] |
LI Hongjuan, LIN Kai, LI Keqiu. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communication, 2010, 34(4):591-597.
|
[9] |
杨庚, 王安琪, 陈正宇, 等. 一种低能耗的数据融合隐私保护算法[J]. 计算机学报, 2011, 34(5):792-800.YANG Geng, WANG Anqi, CHEN Zhengyu, et al. An energy-saving privacy-preserving data aggregation algorithm[J]. Chinese Journal of Computers, 2011, 34(5):792-800. (in Chinese)
|
[10] |
杨庚, 李森, 陈正宇, 等. 传感器网络中面向隐私保护的高精度数据融合算法[J]. 计算机学报, 2013, 36(1):189-200.YANG Geng, LI Sen, CHEN Zhengyu, et al. High-accuracy and privacy-preserving oriented data aggregation algorithm in sensor networks[J]. Chinese Journal of Computers, 2013, 36(1):189-200. (in Chinese)
|
[11] |
YAO Jianbo, WEN Guangjun. Protecting classification privacy data aggregation in wireless sensor networks[C]//Proc 4th International Conference on Wireless Communication, Networking and Mobile Computing, WiCOM. Dalian, China:IEEE Press, 2008:1-5.
|
[12] |
GUO Hongzhi. A modified scheme for privacy-preserving data aggregation in WSNs[C]//Proc 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). Yichang, China:IEEE Press, 2012:790-794.
|
[13] |
Ukil A, Sen J. Secure multiparty privacy preserving data aggregation by modular arithmetic[C]//Proc 1st International Conference on Parallel, Distributed, and Grid Computing. Solan, India:IEEE Press, 2010:329-334.
|
[14] |
Goldreich O. Secure Multi-Party Computation, Working Draft[Z/OL]. Version 1.4 (2002-10-27)[2015-10-23]. http://www.wisdom.weizmann.ac.il/~oded/PSX/prot.pdf.
url: http://www.wisdom.weizmann.ac.il/~oded/psx/prot.pdf.
|
[15] |
Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//Proc 9th ACM Conference on Computer and Communications Security. Washington DC, USA:ACM Press, 2002:41-47.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|