Privacy-Preserving and Dynamic Spatial Range Aggregation Query Processing in Wireless Sensor Networks

被引:2
|
作者
Wang, Lisong [1 ]
Hu, Zhenhai [1 ]
Liu, Liang [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
来源
DATABASE SYSTEMS FOR ADVANCED APPLICATIONS | 2019年 / 11448卷
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Query processing; Privacy protection; Spatial range aggregation query;
D O I
10.1007/978-3-030-18590-9_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing privacy-preserving aggregation query processing methods in sensor networks rely on pre-established network topology and require all nodes in the network to participate in query processing. Maintaining the topology results in a large amount of energy overhead, and in many cases, the user is interested only in the aggregated query results of some areas in the network, and thus, the participation of the entire network node is not necessary. Aiming to solve this problem, this paper proposes a spatial range aggregation query algorithm for a dynamic sensor network with privacy protection (E(2)PDA-Energy-efficient Privacy-preserving Data Aggregation). The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir's secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. The analysis and experimental results show that the proposed algorithm outperforms the existing algorithms in terms of energy and privacy protection.
引用
收藏
页码:278 / 281
页数:4
相关论文
共 50 条
  • [21] Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
    Ye, Chong-Qiang
    Li, Jian
    Chen, Xiao-Yu
    SENSORS, 2024, 24 (22)
  • [22] Aggregation-Based Privacy-Preservation Approximate Query Protocol in Wireless Sensor Networks
    Fan, Yongjian
    Zhang, Xiaoying
    Chen, Hong
    PROCEEDINGS OF 2013 CHINESE INTELLIGENT AUTOMATION CONFERENCE: INTELLIGENT AUTOMATION & INTELLIGENT TECHNOLOGY AND SYSTEMS, 2013, 255 : 805 - 812
  • [23] A Privacy-Preserving Distributed Smart Metering Temporal and Spatial Aggregation Scheme
    Zhang, Lei
    Zhang, Jing
    Hu, Yu Hen
    IEEE ACCESS, 2019, 7 : 28372 - 28382
  • [24] A secure and efficient privacy-preserving data aggregation algorithm
    Hui Dou
    Yuling Chen
    Yixian Yang
    Yangyang Long
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1495 - 1503
  • [25] An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    Zia, Tanveer A.
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (11) : 1205 - 1207
  • [26] A secure and efficient privacy-preserving data aggregation algorithm
    Dou, Hui
    Chen, Yuling
    Yang, Yixian
    Long, Yangyang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1495 - 1503
  • [27] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Journal of Ambient Intelligence and Humanized Computing, 2017, 8 : 101 - 116
  • [28] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2017, 8 (01) : 101 - 116
  • [29] CPP: Towards comprehensive privacy preserving for query processing in information networks
    Liu, Chaobin
    Zhou, Shuigeng
    Hu, Haibo
    Tang, Yuzhe
    Guan, Jihong
    Ma, Yao
    INFORMATION SCIENCES, 2018, 467 : 296 - 311
  • [30] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52