Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 311-314.

Previous Articles     Next Articles

Complex Number-based Privacy Data Aggregation

CAO Xiao-mei and LIU Da-wei   

  • Online:2018-11-16 Published:2018-11-16

Abstract: The scheme is committed to realize the security of data aggregation,and we proposed an secure data aggregation scheme CNPD based on in wireless sensor networks.CNPD scheme applies its own private data to form a plural custom data to hide sensitive data.Even if the private data being eavesdropped or decrypted by the attacker,this method can prevent them to resuming the sensitive information,so there is an effective protection of user privacy data security.The theoretical analysis and simulation experiments finally show that CNPD is more efficient than PDA in terms of communication overhead and security.

Key words: Wireless sensor networks,Data aggregation,Complex number,Data security

[1] 孙利民,等.无线传感器网络[M].北京:清华大学出版社,2005
[2] Culler D,Estrin D,Srivastava M.Overview of Sensor Networks[J].IEEE Computer Society Press,2004,7(8):41-49
[3] 康健,左宪章,唐力伟,等.无线传感器网络数据融合技术[J].计算机科学,2010,7(4):31-35
[4] 张鹏,喻建平,刘宏伟.传感器网络安全数据融合[J].计算机科学,2011,4(8):106-108
[5] Dong Xiao-mei,Li Shan-shan.A Secure Data Aggregation Ap-proach Based on Monitoring in Wireless Sensor Networks[J].IEEE Computer Society,2011,10(9):122-129
[6] Chen Chien-ming,Lin Yue-Hsun,Lin Ya-Ching,et al.RCDA:Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks[J].IEEE Computer Society,2012,23(4):727-734
[7] 黎为.无线传感器网络数据融合安全方案的研究[D].长沙:湖南大学,2009
[8] Girao J,Westhoff D,Schneider M.CDA:Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks[C]∥Proc of IEEE International Conference on Communications.Washington:IEEE Computer Society Press,2005:3044-3049
[9] Ferrer J D.A Provably Secure Additive and Multiplicative Privacy Homomorphism[C]∥Proc of the 5th International Confe-rence on Information Security.London:Springer-Verlag Press,2002:471-483
[10] Castelluccia C,Mykletun E,Tsudik G.Efficient Aggregation of Encrypted Data in Wireless Sensor Networks[C]∥Proc.of the Second Annual International Conference on Mobile and Ubiquitous Systems:Networking and Services.2005:109-117
[11] Mykletun E,Girao J,Westhoff D.Public Key Based Cryptos-chemes for Data Concealment in Wireless Sensor Networks[C]∥Proc of IEEE International Conference on Communications.New York:IEEE Communications Society Press,2006:2288-2295
[12] He W B,Liu X,Nguyen H.Pda:Privacy-preserving Data Aggregation in Wireless Sensor Networks[C]∥Proc of 26th IEEE International Conference on Computer Communications.Washington:IEEE Computer Society Press,2007:2045-2053
[13] Li H,Lin K,Li K.Energy-efficient and High-Accuracy SecureData Aggregation in Wireless Sensor Networks[J].Computer Communication,2011,34:591-597
[14] 杨庚,王安琪,等.一种低能耗的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800
[15] Madden,Samuel R,Franklin,et al.TAG:a Tiny Aggregation Service for Ad Hoc Sensor Networks[J].OSDI,2002,36(SI)
[16] Madden,Franklin,Hellerstein,et al.TinyDB:an AcquisitionalQuery Processing System for Sensor Networks[J].ACM Transactions on Database Systems,2004,30(1):122-173
[17] Zitterbart M.An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks[C]∥Proceedings of the 2006ACM Symposium on Information,Computer and Communications Security.March 2006:303-310

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!