Private Aggregation Scheme based on Erasable Data-hiding in Wireless Sensor Networks

被引:1
作者
Zeng, Weini [1 ]
Chen, Peng [1 ]
Yi, Yeqing [2 ]
机构
[1] Jiangsu Automat Res Inst, Dept 9, Lianyungang, Jiangsu, Peoples R China
[2] Hunan Univ Humanities Sci & Technol, Dept Informat Sci & Engn, Loudi, Hunan, Peoples R China
来源
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016) | 2016年
关键词
Wireless Sensor Networks; Erasable Data-hiding; data aggregation; privacy; distributed; PRESERVING DATA AGGREGATION; EFFICIENT;
D O I
10.1109/FiCloud.2016.19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A privacy-preserving aggregation scheme based on the designed erasable data-hiding technique was proposed for sensor networks. With this technique, each sensory data item could be hidden by the sensor node which collects it without data exchange; then, the hidden data is reported to the cluster head; and finally, the aggregation result can be recovered from the hidden data in the cluster head which doesn't have any data used for data-hiding. Extensive analysis shows that the proposed scheme is able to preserve privacy more efficiently while consuming less communication overhead and computational overhead, and also has a good resistance to data loss.
引用
收藏
页码:76 / 83
页数:8
相关论文
共 21 条
[11]  
Guan X, 2011, INT J INNOV COMPUT I, V7, P1891
[12]   PDA: Privacy-preserving data aggregation in wireless sensor networks [J].
He, Wenbo ;
Liu, Xue ;
Nguyen, Hoang ;
Nahrstedt, Klara ;
Abdelzaher, Tarek .
INFOCOM 2007, VOLS 1-5, 2007, :2045-+
[13]   Secure encrypted-data aggregation for wireless sensor networks [J].
Huang, Shih-I ;
Shieh, Shiuhpyng ;
Tygar, J. D. .
WIRELESS NETWORKS, 2010, 16 (04) :915-927
[14]  
Jung TH, 2013, IEEE INFOCOM SER, P2634
[15]   TAG:: a Tiny AGgregation service for ad-hoc sensor networks [J].
Madden, S ;
Franklin, MJ ;
Hellerstein, JM ;
Wei, H .
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, :131-146
[16]   Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks [J].
Mukherjee, Partha ;
Sen, Sandip .
COMPUTER JOURNAL, 2011, 54 (03) :482-489
[17]  
van Greunen J., 2003, P 2 ACM INT C WIR SE, P11
[18]   Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation [J].
Westhoff, Dirk ;
Girao, Joao ;
Acharya, Mithun .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (10) :1417-1431
[19]  
Zeng WN, 2014, AD HOC SENS WIREL NE, V21, P21
[20]  
Zhang WS, 2008, INT CONF PERVAS COMP, P179, DOI 10.1109/PERCOM.2008.60