Private Aggregation Scheme based on Erasable Data-hiding in Wireless Sensor Networks

被引:1
作者
Zeng, Weini [1 ]
Chen, Peng [1 ]
Yi, Yeqing [2 ]
机构
[1] Jiangsu Automat Res Inst, Dept 9, Lianyungang, Jiangsu, Peoples R China
[2] Hunan Univ Humanities Sci & Technol, Dept Informat Sci & Engn, Loudi, Hunan, Peoples R China
来源
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016) | 2016年
关键词
Wireless Sensor Networks; Erasable Data-hiding; data aggregation; privacy; distributed; PRESERVING DATA AGGREGATION; EFFICIENT;
D O I
10.1109/FiCloud.2016.19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A privacy-preserving aggregation scheme based on the designed erasable data-hiding technique was proposed for sensor networks. With this technique, each sensory data item could be hidden by the sensor node which collects it without data exchange; then, the hidden data is reported to the cluster head; and finally, the aggregation result can be recovered from the hidden data in the cluster head which doesn't have any data used for data-hiding. Extensive analysis shows that the proposed scheme is able to preserve privacy more efficiently while consuming less communication overhead and computational overhead, and also has a good resistance to data loss.
引用
收藏
页码:76 / 83
页数:8
相关论文
共 21 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 1978, Found. Sec. Comput
[3]  
Bista R, 2010, 2010 IEEE INT C NETW, P128
[4]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[5]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[6]   Privacy-preserving robust data aggregation in wireless sensor networks [J].
Conti, Mauro ;
Zhang, Lei ;
Roy, Sankardas ;
Di Pietro, Roberto ;
Jajodia, Sushil ;
Mancini, Luigi Vincenzo .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) :195-213
[7]   A high performance and intrinsically secure key establishment protocol for wireless sensor networks [J].
Fanian, Ali ;
Berenjkoub, Mehdi ;
Saidi, Hossein ;
Gulliver, T. Aaron .
COMPUTER NETWORKS, 2011, 55 (08) :1849-1863
[8]  
Feng T, 2008, P IEEE INFOCOM, P131
[9]  
Girao J, 2005, IEEE ICC, P3044
[10]  
Groat MM, 2011, IEEE INFOCOM SER, P2024, DOI 10.1109/INFCOM.2011.5935010