A privacy-preserving data aggregation scheme in wireless sensor networks

被引:0
作者
Fu S. [1 ,2 ]
Jiang Q. [2 ]
Ma J. [2 ]
机构
[1] School of Electronic and Information Engineering, Beijing Polytechnic, Beijing
[2] School of Computer Science and Technology, Xidian University, Xi'an
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2016年 / 53卷 / 09期
基金
中国国家自然科学基金;
关键词
Data aggregation; Data perturbation; Energy efficient; Privacy preserving; Wireless sensor networks (WSNs);
D O I
10.7544/issn1000-1239.2016.20150456
中图分类号
学科分类号
摘要
Privacy preservation is one of the most challenging problems on secure data aggregation in wireless sensor networks (WSNs). In WSNs, current data aggregation schemes with privacy preservation cannot meet the requirements of security and energy saving, and have several disadvantages such as complex computation, considerable communication load or low-security. An energy-efficient and data-loss resilient data aggregation scheme with privacy preservation is proposed in this paper. Two different forms of perturbation data are adopted to protect the data privacy of each node from being disclosed to the sink and any other nodes in the network. Firstly, from the point of view of sink intrusion, we describe the design scheme of initial perturbation data. On the basis of it, we present the construction method of second data perturbation and the operation procedures of aggregation validation for intermediate aggregators and the sink. To resist various external attacks efficiently, the technique of message authentication code is introduced. Security and property analysis show that the proposed scheme can ensure the security of nodes on the premise of lower energy power. In addition, it has a strong ability against data-loss, and both its security and energy efficiency perform better than current works. © 2016, Science Press. All right reserved.
引用
收藏
页码:2030 / 2038
页数:8
相关论文
共 13 条
[1]  
Ramesh R., Varshney P.K., Data aggregation techniques in sensor networks: A survey, Communications Surveys & Tutorials, 8, 4, pp. 48-63, (2006)
[2]  
Yick J., Mukherjee B., Ghosal D., Wireless sensor network survey, Computer Networks, 52, 12, pp. 2292-2330, (2008)
[3]  
He W., Nguyen H., PDA: Privacy-preserving data aggregation in wireless sensor networks, Proc of the 26th IEEE Int Conf on Computer Communications, pp. 2045-2053, (2007)
[4]  
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks, Proc of the 2nd Annual Int Conf on Mobile and Ubiquitous Systems in Computing, Networking and Services, pp. 109-117, (2005)
[5]  
Yang G., Wang A., Chen Z., Et al., An energy-saving privacy-preserving data aggregation algorithm, Chinese Journal of Computers, 34, 5, pp. 792-800, (2011)
[6]  
Bista R., Kim D., Chang J., A new private data aggregation scheme for wireless sensor networks, Proc of the 10th Int Conf on Computer and Information Technology, pp. 273-280, (2010)
[7]  
Mao W., Modern Cryptography: Theory and Practice, pp. 118-160, (2003)
[8]  
Colin B., Mao W., Kenneth G.P., Key agreement using statically keyed authenticators, Proc of the 2nd Int Conf on Applied Cryptography and Network Security (ACNS'04), pp. 248-262, (2004)
[9]  
Eschenauer L., Gligor V., A key-management scheme for distributed sensor networks, Proc of the 9th ACM Conf on Computer and Communications Security, pp. 41-47, (2002)
[10]  
Lu R., Lin X., Zhu H., Et al., BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks, IEEE Trans on Parallel and Distributed Systems, 23, 1, pp. 32-43, (2012)