Computer Science ›› 2013, Vol. 40 ›› Issue (7): 84-88.

Previous Articles     Next Articles

Privacy-preserving Dynamic Integrity-verification Algorithm in Data Aggregation

CHEN Wei,YANG Long and YU Le   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Privacy exposure,information tampering and false data injection are serious challenges in wireless sensor network data aggregation.How to protect the privacy and integrity of data has become a hot research issue in data aggregation.To detect any malicious data tampering and protect data privacy in data aggregation,a novel Privacy-preserving dynamic Integrity-verification(PDI) algorithm was proposed.The PDI algorithm uses the data is perturbation to protect data privacy.In order to protect the integrity of privacy data,the PDI algorithm generates monitoring nodes between the current aggregator and its parent node depending on the network structure dynamically.Therefore,if the data is tampered by the aggregator,it can be detected at the early stage.The simulation results show that the PDI algorithm can reali-ze privacy preserving and integrity verification with less communication and computation overhead.

Key words: Wireless sensor network,Data aggregation,Privacy preserving,Integrity verification,Data perturbation

[1] Madden S,Franklin M J,Hellerstein J M.TAG:A tiny aggregation service for ad hoc sensor networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York,USA,2002:131-146
[2] He Wenbo,Hoang Nguyen,Liu Xue,et al.Pda:Privacy-preserving data aggregation in wireless sensor networks[C]∥Procee-dings of 26th IEEE International Conference on Computer Communications(INFOCOMM).2007:2045-2053
[3] He Wenbo,Hoang Nguyen,Liu Xue,et al.iPDA:An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks[C]∥Proceedings of IEEE Military Communications Conference.2008:1-7
[4] Feng T,Wang C,Zhang W,et al.Confidentiality protection for distributed sensor data aggregation[C]∥Proceedings of 27th IEEE International Conference on Computer Communications(INFOCOMM).Phoenix,AZ,USA,2008:56-60
[5] Wang Chuang,Wang Gui-ling,Zhang Wen-sheng,et al.Reconciling Privacy Preservation and Intrusion Detection in Sensory Data Aggregation[C]∥Proceedings of 27th IEEE International Conference on Computer Communications(INFOCOMM).2011:336-340
[6] Przydatek B,Perrig A,Song D.SIA:secure information aggregation in sensor networks[C]∥Proceedings of the 1st international conference on Embedded networked sensor systems.New York,USA,2003:255-265
[7] Yang Y,Wang X,Zhu S,et al.SDAP:a secure hop-by-hop data aggregation protocol for sensor networks[J].ACM Transactions on Information and System Security,2008,11(4)
[8] Ozdemir S,am H.Integration of False Data Detection WithData Aggregation and Confidential Transmission in Wireless Sensor Networks[J].IEEE/ACM T ransactions on Networking,2010,18(3):736-749
[9] Blundo C,Santis A,Herzberg A,et al.Perfectly-secure key distribution for dynamic conferences[J].Proceedings of Crypto,1992,740:471-486
[10] Du W,Deng J,Han Y S,et al.A pairwise key pre-distribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258
[11] Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77
[12] Karlof C,Sastry N,Wagner D.TinySec:A link layer security architecture for wireless sensor networks[C]∥Proceedings of the 2nd international conference on Embedded networked sensor systems.New York,USA,2004:162-175
[13] Zhang W,Wang C,Feng T.Gp2s:Generic privacy-preservation solutions for approximate aggregation of sensor data[C]∥Proceedings of IEEE PerCom.2008:179-184
[14] 陈娟,张宏莉.无线传感器网络安全研究综述[J].哈尔滨工业大学学报,2011,43(7):90-95
[15] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146
[16] 姚剑波,文光俊.无线传感器网络中的隐私保护研究[J].计算机科学,2008,35(11):19-22
[17] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800
[18] 张鹏,喻建平,刘宏伟.传感器网络安全数据融合[J].计算机科学,2011,38(8):106-108

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!