Privacy-Preserving and Itinerary-Based Data Aggregation Algorithm in Wireless Sensor Networks

被引:0
作者
Wang T.-C. [1 ,2 ]
Qin X.-L. [1 ]
Zhang J. [3 ]
Ding Y.-W. [1 ]
Chen F.-L. [2 ]
Luo Y.-L. [2 ]
机构
[1] College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu
[2] College of Mathematics and Computer Science, Anhui Normal University, Wuhu, 241003, Anhui
[3] Faculty of Health, Engineering and Sciences, The University of Southern Queensland, Toowoomba, 4350, QLD
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2017年 / 45卷 / 06期
关键词
Concentric-circle; Data aggregation; Infrastructure-free; Privacy-preserving; Wireless sensor networks;
D O I
10.3969/j.issn.0372-2112.2017.06.008
中图分类号
学科分类号
摘要
To solve the problems that the existing privacy-preserving data aggregation relies on a network infrastructure, and data privacy is achieved by excessive encryption process, this paper proposes a privacy-preserving and concentric-circle itinerary-based data aggregation algorithm (PCIDA). Based on a well-designed ideal itinerary for data aggregation, PCIDA is not susceptible to network topology structure. In addition, PCIDA uses secure channel to ensure data privacy with no encryption/decryption operations during data aggregation. PCIDA performs data aggregation in parallel along with well-designed concentric-circle itineraries to achieve small delivery delay. Theoretical analysis and experimental results show that PCIDA enjoys low communication overhead and energy consumption, yet high safety and accuracy. © 2017, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1334 / 1341
页数:7
相关论文
共 13 条
[1]  
Bagaa M., Younis M., Djenouri D., Et al., Distributed low-latency data aggregation scheduling in wireless sensor networks, ACM Transactions on Sensor Networks, 11, 3, (2015)
[2]  
Xu Y., Lee W., Xu J., Et al., Processing window queries in wireless sensor networks, The 22nd International Conference on Data Engineering, pp. 70-80, (2006)
[3]  
Xu J., Feng X., Yang F.-G., Et al., A data collection method by maximizing minimum probability of energy consumption for mobile Sink based WSNs, Acta Electronica Sinica, 43, 12, pp. 2470-2475, (2015)
[4]  
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109-117, (2005)
[5]  
He W., Liu X., Nguyen H., Nahrstedt K., Abdelzaher T., PDA: Privacy-preserving data aggregation for information collection, ACM Transactions on Sensor Networks, 8, 1, (2011)
[6]  
Ozdemir S., Miao P., Yang X., PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks, Wireless Communications and Mobile Computing, 15, 4, pp. 615-628, (2015)
[7]  
Lin Y.H., Chang S.Y., Sun H.M., CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks, IEEE Transactions on Knowledge and Data Engineering, 25, 7, pp. 1471-1483, (2013)
[8]  
Parmar K., Jinwala D.C., Concealed data aggregation in wireless sensor networks: A comprehensive survey, Computer Networks, 103, pp. 207-227, (2016)
[9]  
Chen C.M., Lin Y.H., Lin Y.C., Et al., RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 23, 4, pp. 727-734, (2012)
[10]  
Rezvani M., Ignjatovic A., Bertino E., Jha S., Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks, IEEE Transactions on Dependable and Secure Computing, 12, 1, pp. 98-110, (2015)