Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

被引:1
作者
Li, Peng [1 ]
Xu, Chao [1 ]
Xu, He [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
Collection Tree Protocol; Disturbing Data; Network Security; Privacy Protection; Slice Technology; PRESERVING DATA AGGREGATION; LOCATION PRIVACY; SECURE; EFFICIENT;
D O I
10.4018/IJISP.20210101.oa1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.
引用
收藏
页码:190 / 212
页数:23
相关论文
共 26 条
[1]   Secure comparison of encrypted data in wireless sensor networks [J].
Acharya, M ;
Girao, J ;
Westhoff, D .
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, :47-53
[2]   Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications [J].
Al Ameen, Moshaddique ;
Liu, Jingwei ;
Kwak, Kyungsup .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) :93-101
[3]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[4]   Providing Source Location Privacy in Wireless Sensor Networks: A Survey [J].
Conti, Mauro ;
Willemsen, Jeroen ;
Crispo, Bruno .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1238-1280
[5]   A Security and Privacy Survey for WSN in e-Health Applications [J].
Cosio Leon, Maria de los Angeles ;
Nieto Hipolito, Juan Ivan ;
Luna Garcia, Jesus .
CERMA: 2009 ELECTRONICS ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE, 2009, :125-+
[6]  
Emimanothaya A., 2017, SOCIAL SCI ELECT PUB, V1, P16
[7]  
[范永健 Fan Yongjian], 2012, [计算机学报, Chinese Journal of Computers], V35, P1131
[8]  
Goswami S., 2014, ESRSA PUBLICATIONS, V12, P42
[9]  
Groat MM, 2011, IEEE INFOCOM SER, P2024, DOI 10.1109/INFCOM.2011.5935010
[10]   PDA: Privacy-preserving data aggregation in wireless sensor networks [J].
He, Wenbo ;
Liu, Xue ;
Nguyen, Hoang ;
Nahrstedt, Klara ;
Abdelzaher, Tarek .
INFOCOM 2007, VOLS 1-5, 2007, :2045-+