INFORMATION ENGINEERING

Energy-efficient cluster-based privacy data aggregation for wireless sensor networks

  • MAN Dapeng ,
  • WANG Chenye ,
  • YANG Wu ,
  • WANG Wei ,
  • XUAN Shichang ,
  • JIN Xiaopeng
Expand
  • 1. Information Security Research Center, Harbin Engineering University, Harbin 150001, China;
    2. National Science Park of Harbin Engineering University, Harbin 150001, China

Received date: 2016-06-29

  Online published: 2017-02-15

Abstract

Current privacy-preserving data aggregation methods in wireless sensor networks often have large computational and communication costs. This paper presents an energy-efficient cluster-based privacy data aggregation (E-CPDA) mechanism based on the cluster-based privacy data aggregation (CPDA) method. In each round of aggregation, the cluster head chooses a node as a collaborative node for the aggregation, which reduces the computational and communication costs between the nodes in one cluster. Simulations show that E-CPDA has less communication and computational costs with good privacy-preserving performance and higher accuracy than CPDA.

Cite this article

MAN Dapeng , WANG Chenye , YANG Wu , WANG Wei , XUAN Shichang , JIN Xiaopeng . Energy-efficient cluster-based privacy data aggregation for wireless sensor networks[J]. Journal of Tsinghua University(Science and Technology), 2017 , 57(2) : 213 -219 . DOI: 10.16511/j.cnki.qhdxxb.2017.22.017

References

[1] LI Na, ZHANG Nan, Das S K, et al. Privacy-preserving in wireless sensor networks:A state-of-the-art survey[J]. Ad Hoc Networks, 2009, 7(8):1501-1514. [2] Ozdemir S, XIAO Yang. Secure data aggregation in wireless sensor networks:A comprehensive overview[J]. Computer Networks, 2009, 53(12):2022-2037. [3] 范永健, 陈红. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012, 35(6):1131-1146.FAN Yongjian, CHEN Hong. Data privacy preservation in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(6):1131-1146. (in Chinese) [4] HE Wenbo, LIU Xue, Nguyen H, et al. PDA:Privacy-preserving data aggregation in wireless sensor networks[C]//Proc 26th IEEE International Conference on Computer Communications. Anchorage, AK, USA:IEEE Press, 2007:2045-2053. [5] Bista R, Jo K J. A new approach to secure aggregation of private data in wireless sensor networks[C]//Proc 8th IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu, China:IEEE Press, 2009:394-399. [6] WANG Fushun, WANG Bin, SUN Xiaohua. Data merging method by protecting energy in wireless sensor networks[J]. Journal of Networks, 2014, 9(6):1558-1564. [7] LI Li, QIN Qin, LI Hua, et al. Data fusion algorithm of privacy protection based on QoS and multilayers hierarchically[J]. International Journal of Distributed Sensor Networks, 2013, 2013, 926038. [8] LI Hongjuan, LIN Kai, LI Keqiu. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communication, 2010, 34(4):591-597. [9] 杨庚, 王安琪, 陈正宇, 等. 一种低能耗的数据融合隐私保护算法[J]. 计算机学报, 2011, 34(5):792-800.YANG Geng, WANG Anqi, CHEN Zhengyu, et al. An energy-saving privacy-preserving data aggregation algorithm[J]. Chinese Journal of Computers, 2011, 34(5):792-800. (in Chinese) [10] 杨庚, 李森, 陈正宇, 等. 传感器网络中面向隐私保护的高精度数据融合算法[J]. 计算机学报, 2013, 36(1):189-200.YANG Geng, LI Sen, CHEN Zhengyu, et al. High-accuracy and privacy-preserving oriented data aggregation algorithm in sensor networks[J]. Chinese Journal of Computers, 2013, 36(1):189-200. (in Chinese) [11] YAO Jianbo, WEN Guangjun. Protecting classification privacy data aggregation in wireless sensor networks[C]//Proc 4th International Conference on Wireless Communication, Networking and Mobile Computing, WiCOM. Dalian, China:IEEE Press, 2008:1-5. [12] GUO Hongzhi. A modified scheme for privacy-preserving data aggregation in WSNs[C]//Proc 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). Yichang, China:IEEE Press, 2012:790-794. [13] Ukil A, Sen J. Secure multiparty privacy preserving data aggregation by modular arithmetic[C]//Proc 1st International Conference on Parallel, Distributed, and Grid Computing. Solan, India:IEEE Press, 2010:329-334. [14] Goldreich O. Secure Multi-Party Computation, Working Draft[Z/OL]. Version 1.4 (2002-10-27)[2015-10-23]. http://www.wisdom.weizmann.ac.il/~oded/PSX/prot.pdf. [15] Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//Proc 9th ACM Conference on Computer and Communications Security. Washington DC, USA:ACM Press, 2002:41-47.
Outlines

/