Data aggregation algorithm based on privacy-protection and integrity in wireless sensor networks

被引:0
作者
Feng, Juan [1 ,2 ]
Huang, Haiping [1 ,2 ,3 ]
Zhou, Xuan [1 ,2 ]
Hu, Kangheng [2 ]
Yin, Zhengwei [2 ]
机构
[1] College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
[2] Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing
[3] College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing
来源
Journal of Computational Information Systems | 2014年 / 10卷 / 20期
关键词
Data aggregation; Homomorphic encryption; Integrity; Privacy protection;
D O I
10.12733/jcis12140
中图分类号
学科分类号
摘要
Many data-centric applications in wireless sensor networks (abbr. WSNs) require the data acquired by sensor nodes cannot be known by others, in the process of not only data transmission but also data aggregation. To achieve the data privacy-protection, it proposes an algorithm of integrity-protecting homomorphic encryption private data aggregation (iHEPDA). Random seeds are used in this algorithm to confuse the original data, and meanwhile the header of data packet after homomorphic encryption is utilized to test the integrity of aggregated results, furthermore, based on the TAG protocol, the data aggregating tree is designed to realize the algorithm. The theoretical analysis and simulated experiments has found that iHEPDA algorithm has the advantages of high security, satisfactory operability, good accuracy with a little more communication cost, compared with the current algorithms or protocols. 1553-9105/Copyright © 2014 Binary Information Press
引用
收藏
页码:8963 / 8971
页数:8
相关论文
共 15 条
[1]  
Madden S., Franklin M.J., Hellerstein J.M., Et al., TAG: A tiny aggregation service for ad-hoc sensor networks , ACM SIGOPS Operating Systems Review, 36, pp. 131-146, (2002)
[2]  
Zhang L., Li X., Liu Y., Et al., Verifiable private multi-party computation: ranging and ranking , 2013 Proceedings of 33th IEEE INFOCOM, pp. 605-609, (2013)
[3]  
Othman S.B., Trad A., Youssef H., Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks , 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 188-195, (2013)
[4]  
Conti M., Willemsen J., Crispo B., Providing Source Location Privacy in Wireless Sensor Networks: A Survey , IEEE Communication Surveys and Tutorials, 15, 3, pp. 1238-1280, (2013)
[5]  
Yang Y., Wang X., Zhu S., Et al., SDAP: A secure hop-by-hop data aggregation protocol for sensor networks , ACM Transactions on Information and System Security (TISSEC), 11, 4, pp. 356-367, (2008)
[6]  
Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks , Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, (2002)
[7]  
Zia T., Zomaya A., A secure triple-key management scheme for wireless sensor networks , Proceedings of 25th IEEE INFCOM, pp. 1-2, (2006)
[8]  
Yu Z., Guan Y., A key management scheme using deployment knowledge for wireless sensor networks , IEEE Transactions on Parallel and Distributed Systems, 19, 10, pp. 1411-1425, (2006)
[9]  
He W., Liu X., Nguyen H., Et al., PDA: Privacy-preserving data aggregation in wireless sensor networks , Proceedings of the 26th IEEE INFOCOM, pp. 2045-2053, (2007)
[10]  
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks , The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005 (MobiQuitous 2005), pp. 109-117, (2005)