ZHANG Jun, ZHU Jianghao, JIA Zongpu, et al., “A Secret Confusion Based Energy-Saving and Privacy-Preserving Data Aggregation Algorithm,” Chinese Journal of Electronics, vol. 26, no. 4, pp. 740-746, 2017, doi: 10.1049/cje.2016.08.031
Citation: ZHANG Jun, ZHU Jianghao, JIA Zongpu, et al., “A Secret Confusion Based Energy-Saving and Privacy-Preserving Data Aggregation Algorithm,” Chinese Journal of Electronics, vol. 26, no. 4, pp. 740-746, 2017, doi: 10.1049/cje.2016.08.031

A Secret Confusion Based Energy-Saving and Privacy-Preserving Data Aggregation Algorithm

doi: 10.1049/cje.2016.08.031
Funds:  This work is supported by the National Basic Research Program of China (No.2013CB338002), and the National Natural Science Foundation of China (No.61272476, No.61232009, No.61202420).
  • Received Date: 2015-04-10
  • Rev Recd Date: 2016-04-11
  • Publish Date: 2017-07-10
  • To reduce communication overhead on the premise of privacy protection, this study presents a novel secret Confusion based energy-saving and privacypreserving data aggregation algorithm (CESPT). In confusion phase, CESPT confuses real sensory data and their sources by positive-negative pairs and a confusion factor is introduced to determine the quantity of pairs generated by a sensor, the exchange rounds and the threshold of data exchange, which affect communication overhead and privacy intensity of a Wireless sensor network (WSN). In aggregation phase, CESPT adopts a positive-negative neutralization strategy and a well-designed time slice allocation mechanism to reduce network traffic and message collision. In a word, CESPT can greatly reduce data traffic and energy consumption and obtain accurate statistical results on the basis of data privacy.
  • loading
  • Y. Sun, X. Ma and H. Luo, “A general description schema of services for WSNs”, Chinese Journal of Electronics, Vol.23, No.3, pp.604-610, 2014.
    M. Xiao, L. Huang, K. Xing and A. Liu, “Opportunistic data aggregation in low-duty-cycle wireless sensor networks with unreliable links”, Chinese Journal of Electronics, Vol.22, No.3, pp.599-603, 2013.
    Y. Liu, Q. Pan, H. Yu and Y. Liang, “Robust acoustic source localization in energy-stringent sensor networks”, Chinese Journal of Computers, Vol.21, No.2, pp.332-338, 2012.
    X. Li and Y. Sun, “A service mining scheme based on semantic for internet of things”, Chinese Journal of Electronics, Vol.23, No.2, pp.236-242, 2014.
    D. Zhu, J. Han, J. Ou and J. Min, “Single beacon cruise positioning algorithm in wireless sensor networks”, Chinese Journal of Electronics, Vol.22, No.3, pp.558-562, 2013.
    Y. Fan, H. Chen and X. Zhang, “Data privacy preservation techniques in wireless sensor networks”, Chinese Journal of Computers, Vol.34, No.6, pp.1131-1146, 2012.
    D. Jiang, Z. Xu, L. Niu and J. Liu, “An approximate approach to end-to-end traffic in communication networks”, Chinese Journal of Electronics, Vol.21, No.4, pp.705-710, 2014.
    W. He, X. Liu, H. Nguyen, et al., “PDA: Privacy-preserving data aggregation in wireless sensor networks”, IEEE International Conference on Computer Communications, Anchorage, USA, pp.2045-2053, 2007.
    V. Hai, T. Nguyen, N. Mittal, et al., “PEQ: A privacypreserving scheme for exact query evaluation in distributed sensor data networks”, 28th IEEE International Symposium on Reliable Distributed Systems, New York, USA pp.189-198, 2009.
    Y. Li, M. Tian, L. Huang and W. Yang, “Secret confusion of privacy-preserving data aggregation in wireless sensor networks”, Journal of Chinese Computer Systems, Vol.34, No.7, pp.1603-1606, 2013.
    M.M. Groat, W. He and S. Forrest, “KIPDA: Kindistinguishable privacy-preserving data aggregation in wireless sensor networks”, Proc. of the 30th IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China, pp.2024-2032, 2011.
    G. Yang, A. Wang, Z. Chen, et al., “An energy-saving privacypreserving data aggregation algorithm”, Chinese Journal of Computers, Vol.34, No.5, pp.792-800, 2011.
    H. Sun, C. Chen and Y. Lin, “RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks”, IEEE Trans on Parallel and Distributed Systems, Vol.23, No.4, pp.727-734, 2012.
    S. Xiao, B. Li and X. Yuan, “Maximizing precision for energyefficient data aggregation in wireless sensor networks with lossy links”, Ad Hoc Networks, Vol.26, pp.103-113, 2014.
    R.D. Pietro, S. Guarino, N.V. Verde, et al., “Security in wireless ad-hoc networksCa survey”, Computer Communications, Vol.51, No.10, pp.1-20, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (448) PDF downloads(984) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return