An Enforcing Integrity and Privacy-Preserving Data Aggregation Protocol in Wireless Sensor Network

Article Preview

Abstract:

It is important to ensure the integrity of the aggregation result and quality of communication among node in wireless sensor network in the condition of high-efficient privacy-preserving data aggregation mechanism. In this paper, we propose a method based on reputation model to solve this problem. During the process of data aggregation, the cluster head node will choose the node with max reputation value as collaborative node to accomplish the aggregation process. To show the efficacy and efficiency of this method, we present the simulation results. The simulation results show that our method iE-CPDA(enforced Integrity Energy-efficient Cluster-based Privacy-preserving Data Aggregation) has less communication and computation and higher accuracy than iCPDA.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3248-3251

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Li, N.; Zhang, N.; Das, S.K.; Thuraisingham, B. Privacy-preserving in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 2009, 7, 1501–1514.

DOI: 10.1016/j.adhoc.2009.04.009

Google Scholar

[2] M. LeMay, G. Gross, C. A. Gunter, and S. Garg, United architecture for large-scale attested metering, in proceedings of HICSS-40, January (2007).

DOI: 10.1109/hicss.2007.586

Google Scholar

[3] Wenbo He, Hoang Nguyen, Xue Liut, Klara Nahrstedt, Tarek Abdelzaher, iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks, (2008).

DOI: 10.1109/milcom.2008.4753645

Google Scholar

[4] Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, A Cluster-based Protocol To Enforce Integrity and Preserve Privacy in Data Aggregation, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

DOI: 10.1109/icdcsw.2009.18

Google Scholar

[5] He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T. Pda: Privacy-preserving data aggregation in wireless sensor networks. In Proceeding of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, May 6–12, 2007, 2045–(2053).

DOI: 10.1109/infcom.2007.237

Google Scholar

[6] Rabindra Bista, Hye-Kyeom Yoo, and Jae-Woo Chang, A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks , 2010 10th IEEE International Conference on Computer and Information Technology(CIT 2010).

DOI: 10.1109/cit.2010.422

Google Scholar

[7] Madden, Samuel R., Franklin, Michael J., Hellerstein, Joseph M., Hong, W., TAG: a tiny aggregation service for ad hoc sensor networks, OSDI, (2002).

DOI: 10.1145/1060289.1060303

Google Scholar

[8] ZHAO Dan, YANG Geng, A Complex Field-based Integrity-protecting Data Aggregation Algorithm, (2012).

Google Scholar

[9] S. Ozdemir. Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Communications, 2008: 3941-3953.

DOI: 10.1016/j.comcom.2008.07.017

Google Scholar

[9] Xiao Deqin, Feng Jianzhao, Yang Bo, Zhang Huanguo, Reputation Formal Model for Wireless Sensor Network, Computer Science, 2007, Vol. 34, No. 6, 84-87.

Google Scholar

[10] Rabindra Bista, Kim Hee-Dae and Jae-Woo Chang, A New Private Data Aggregation Scheme for Wireless Sensor Networks, 2010 10th IEEE International Conference on Computer and Information Technology(CIT 2010).

DOI: 10.1109/cit.2010.79

Google Scholar