Energy-efficient cluster-based privacy data aggregation for wireless sensor networks

MAN Dapeng, WANG Chenye, YANG Wu, WANG Wei, XUAN Shichang, JIN Xiaopeng

Journal of Tsinghua University(Science and Technology) ›› 2017, Vol. 57 ›› Issue (2) : 213-219.

PDF(1237 KB)
PDF(1237 KB)
Journal of Tsinghua University(Science and Technology) ›› 2017, Vol. 57 ›› Issue (2) : 213-219. DOI: 10.16511/j.cnki.qhdxxb.2017.22.017
INFORMATION ENGINEERING

Energy-efficient cluster-based privacy data aggregation for wireless sensor networks

  • {{article.zuoZhe_EN}}
Author information +
History +

Abstract

Current privacy-preserving data aggregation methods in wireless sensor networks often have large computational and communication costs. This paper presents an energy-efficient cluster-based privacy data aggregation (E-CPDA) mechanism based on the cluster-based privacy data aggregation (CPDA) method. In each round of aggregation, the cluster head chooses a node as a collaborative node for the aggregation, which reduces the computational and communication costs between the nodes in one cluster. Simulations show that E-CPDA has less communication and computational costs with good privacy-preserving performance and higher accuracy than CPDA.

Key words

wireless sensor network (WSN) / privacy preservation / data aggregation

Cite this article

Download Citations
MAN Dapeng, WANG Chenye, YANG Wu, WANG Wei, XUAN Shichang, JIN Xiaopeng. Energy-efficient cluster-based privacy data aggregation for wireless sensor networks[J]. Journal of Tsinghua University(Science and Technology). 2017, 57(2): 213-219 https://doi.org/10.16511/j.cnki.qhdxxb.2017.22.017

References

[1] LI Na, ZHANG Nan, Das S K, et al. Privacy-preserving in wireless sensor networks:A state-of-the-art survey[J]. Ad Hoc Networks, 2009, 7(8):1501-1514. [2] Ozdemir S, XIAO Yang. Secure data aggregation in wireless sensor networks:A comprehensive overview[J]. Computer Networks, 2009, 53(12):2022-2037. [3] 范永健, 陈红. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012, 35(6):1131-1146.FAN Yongjian, CHEN Hong. Data privacy preservation in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(6):1131-1146. (in Chinese) [4] HE Wenbo, LIU Xue, Nguyen H, et al. PDA:Privacy-preserving data aggregation in wireless sensor networks[C]//Proc 26th IEEE International Conference on Computer Communications. Anchorage, AK, USA:IEEE Press, 2007:2045-2053. [5] Bista R, Jo K J. A new approach to secure aggregation of private data in wireless sensor networks[C]//Proc 8th IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu, China:IEEE Press, 2009:394-399. [6] WANG Fushun, WANG Bin, SUN Xiaohua. Data merging method by protecting energy in wireless sensor networks[J]. Journal of Networks, 2014, 9(6):1558-1564. [7] LI Li, QIN Qin, LI Hua, et al. Data fusion algorithm of privacy protection based on QoS and multilayers hierarchically[J]. International Journal of Distributed Sensor Networks, 2013, 2013, 926038. [8] LI Hongjuan, LIN Kai, LI Keqiu. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communication, 2010, 34(4):591-597. [9] 杨庚, 王安琪, 陈正宇, 等. 一种低能耗的数据融合隐私保护算法[J]. 计算机学报, 2011, 34(5):792-800.YANG Geng, WANG Anqi, CHEN Zhengyu, et al. An energy-saving privacy-preserving data aggregation algorithm[J]. Chinese Journal of Computers, 2011, 34(5):792-800. (in Chinese) [10] 杨庚, 李森, 陈正宇, 等. 传感器网络中面向隐私保护的高精度数据融合算法[J]. 计算机学报, 2013, 36(1):189-200.YANG Geng, LI Sen, CHEN Zhengyu, et al. High-accuracy and privacy-preserving oriented data aggregation algorithm in sensor networks[J]. Chinese Journal of Computers, 2013, 36(1):189-200. (in Chinese) [11] YAO Jianbo, WEN Guangjun. Protecting classification privacy data aggregation in wireless sensor networks[C]//Proc 4th International Conference on Wireless Communication, Networking and Mobile Computing, WiCOM. Dalian, China:IEEE Press, 2008:1-5. [12] GUO Hongzhi. A modified scheme for privacy-preserving data aggregation in WSNs[C]//Proc 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). Yichang, China:IEEE Press, 2012:790-794. [13] Ukil A, Sen J. Secure multiparty privacy preserving data aggregation by modular arithmetic[C]//Proc 1st International Conference on Parallel, Distributed, and Grid Computing. Solan, India:IEEE Press, 2010:329-334. [14] Goldreich O. Secure Multi-Party Computation, Working Draft[Z/OL]. Version 1.4 (2002-10-27)[2015-10-23]. http://www.wisdom.weizmann.ac.il/~oded/PSX/prot.pdf. [15] Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//Proc 9th ACM Conference on Computer and Communications Security. Washington DC, USA:ACM Press, 2002:41-47.
PDF(1237 KB)

Accesses

Citation

Detail

Sections
Recommended

/