EPPSA: Efficient Privacy-Preserving Statistical Aggregation Scheme for Edge Computing-Enhanced Wireless Sensor Networks

被引:1
作者
Tao, Yunting [1 ]
Kong, Fanyu [1 ]
Yu, Jia [2 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
关键词
SECURE; AUTHENTICATION; RECOMMENDATION;
D O I
10.1155/2022/7359134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In edge computing-enhanced wireless sensor networks (WSNs), multidimensional data aggregation can optimize the utilization of computation resources for data collection. How to improve the efficiency of data aggregation has gained considerable attention in both academic and industrial fields. This article proposes a new efficient privacy-preserving statistical aggregation scheme (EPPSA) for WSNs, in which statistical data can be calculated without exposing the total number of sensor devices to control center. The EPPSA scheme supports multiple statistical aggregation functions, including arithmetic mean, quadratic mean, weighted mean, and variance. Furthermore, the EPPSA scheme adopts the modified Montgomery exponentiation algorithms to improve the aggregation efficiency in the edge aggregator. The performance evaluation shows that the EPPSA scheme gets higher aggregation efficiency and lower communication load than the existing statistical aggregation schemes.
引用
收藏
页数:12
相关论文
共 41 条
[1]  
Alharbi K, 2012, INT CONF WIRE COMMUN
[2]  
[Anonymous], 2019, ISO/IEC 18033-6:2019
[3]  
Assim M., 2020, 2020 INT C INN INT I, P1, DOI [10.1109/3ICT51146.2020.9311966, DOI 10.1109/3ICT51146.2020.9311966]
[4]   A lightweight privacy-preserving scheme with data integrity for smart grid communications [J].
Bao, Haiyong ;
Chen, Le .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04) :1094-1110
[5]   Collaborative Learning-Based Industrial IoT API Recommendation for Software-Defined Devices: The Implicit Knowledge Discovery Perspective [J].
Gao, Honghao ;
Qin, Xi ;
Barroso, Ramon J. Duran ;
Hussain, Walayat ;
Xu, Yueshen ;
Yin, Yuyu .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (01) :66-76
[6]   A Hybrid Approach to Trust Node Assessment and Management for VANETs Cooperative Data Communication: Historical Interaction Perspective [J].
Gao, Honghao ;
Liu, Can ;
Yin, Yuyu ;
Xu, Yueshen ;
Li, Yu .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) :16504-16513
[7]   SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata [J].
Gao, Honghao ;
Zhang, Yida ;
Miao, Huaikou ;
Duran Barroso, Ramon J. ;
Yang, Xiaoxian .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) :2272-2297
[8]   Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data [J].
Gao, Xiang ;
Yu, Jia ;
Chang, Yan ;
Wang, Huaqun ;
Fan, Jianxi .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) :3774-3789
[9]   SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT [J].
Ge, Xinrui ;
Yu, Jia ;
Zhang, Hanlin ;
Bai, Jianli ;
Fan, Jianxi ;
Xiong, Neal N. .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01) :136-150
[10]   APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT [J].
Guan, Zhitao ;
Zhang, Yue ;
Wu, Longfei ;
Wu, Jun ;
Li, Jing ;
Ma, Yinglong ;
Hu, Jingjing .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 :82-92