Computer Science ›› 2013, Vol. 40 ›› Issue (11): 197-202.

Previous Articles     Next Articles

Privacy-preserving Data Aggregation Algorithm with Integrity Verification

SHI Lu-sheng and QIN Xiao-lin   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In order to satisfy the needs of large-scale applications for wireless sensor networks,this paper proposed an aggregation algorithm which can protect the data privacy and verify integrity.First,the algorithm constructs disjoint aggregation trees,and the nodes divides their own data into several slices in each corresponding time slices according to their different degrees,and then the data slices are encrypted and transmitted in every aggregation trees,so privacy-preserving and data integrity can be addressed.Finally,using in-network aggregation based routing tree,the final result of each tree is sent to the base station,and the integrity of the final result is verified by the base station.Simulation results show that the algorithm can obtain higher data aggregation accuracy with lower communication overhead,has better privacy-preserving performance and the aggregation results integrity.

Key words: WSN,Data aggregation,Privacy-preserving,Integrity

[1] He W,Nguyen H,Liu X,et al.iPDA:Anintegrity-protectingprivate data aggregation scheme for wireless sensor networcks[C]∥Proceedings of the Military Communications Conference.SanDiego,CA,USA,2008:1-7
[2] Madden S,Franklin M J,Hellerstein J M.TAG:A Tiny Aggregation Service for Ad hoc Sensor Networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.NewYork,USA,2002:131-146
[3] Deshpande A,Nath S,Gibbons P B,et al.Cache-and-query for wide area sensor databases [C]∥Proceedings of the 2003ACM SIGMOD International Conference on Management of Data.SanDiego,CA,USA,2003:503-514
[4] Tang X,Xu J.Extending network lifetime forprecision con-strained data aggregation in wireless sensor networks[C]∥Proceedings of the IEEE INFOCOM.Barcelona,Catalunya,Spain,2006:755-766
[5] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,5(6):1131-1146
[6] He W,Liu X,Nguyen H,et al.PDA:Privacy-preserving dataaggregation in wireless sensor networks[C]∥Proceedings of the 26th IEEE International Conference on Computer Communications(INFOCOM).Anchorage,USA,2007:2045-2053
[7] Yao Jian-bo,Wen Guang-jum.Protecting classification priracydata aggregation in wireless sensor networks[C]∥Proceedings of the 4th International Conference on Wireless Communication.Networking and Mobile Computing(WiCOM).Dalian,China,2008:1-5
[8] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800
[9] Joao G,Dirk W,Markns S.CDA:Concealed data aggregation for reverse muhicastt raffic in wireleass sensor networks[C]∥Proceedings of the IEEE International Conference on Communications(ICC).Seoul,Korea,2005:3044-3049
[10] Castelluceia C,Mykletun E,Tsudik G.Efficient aggregation ofencrypted data in wireless sensor networks[C]∥Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services(MobiQuitoue).SanDiego,CA,USA,2005:109-117
[11] Feng Tai-ming,Wang Chnang,Zhang Wen-shang,et al.Confi-dentiality protection for distributed sensor data aggregation[C]∥Proceedings of the 27th IEEE International Conference on Computer Communications(INFOCOM).Phoenix,USA,2008:56-60
[12] Ozdemir S,Yang Xiao.Integrity protecting hierarchical con-cealed data aggregation for wireless sensor networks[J].Computer Networks,2011,55(8):1735-1746
[13] Papadopoulos S,Kiayias A,Papadias D.Secure and efficient in-network processing of exact SUM queries[C]∥Proceedings of the 27th International Conference on Data Engineering(ICDE).Hannover,Germany,2011:517-528
[14] Zhang W S,Wang C,Feng T M.GP2S:Generic privacy-preserving solutions for approximate aggregation of sensor data[C]∥Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications(PerCom).Hong Kong,China,2008:179-184
[15] Groat M M,He W B,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM).Shanghai,China,2011:2024-2032
[16] Przydatek B,Song D,Perrig A.SIA:Secure information aggregation in sensor networks[C]∥Proc.of the 1st Int’l Conf.on Embedded Networked Sensor Systems.New York:ACM Press,2003:255-265
[17] Yang Yi,Wang Xin-ran,Zhu Sen-cun,et al.SDAP:A SecureHop-by-Hop Data Aggregation Protocol for Sensor Networks[C]∥ACM Int.l Symp on Mobile Ad Hoc Networking and Computing(MOBIHOC 2006).Florence,Italy,2006:356-367
[18] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops.Montreal,QC,Canada,2009:14-19

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!