• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Shuai, Jiang Qi, Ma Jianfeng. A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456
Citation: Fu Shuai, Jiang Qi, Ma Jianfeng. A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456

A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks

More Information
  • Published Date: August 31, 2016
  • Privacy preservation is one of the most challenging problems on secure data aggregation in wireless sensor networks (WSNs). In WSNs, current data aggregation schemes with privacy preservation cannot meet the requirements of security and energy saving, and have several disadvantages such as complex computation, considerable communication load or low-security. An energy-efficient and data-loss resilient data aggregation scheme with privacy preservation is proposed in this paper. Two different forms of perturbation data are adopted to protect the data privacy of each node from being disclosed to the sink and any other nodes in the network. Firstly, from the point of view of sink intrusion, we describe the design scheme of initial perturbation data. On the basis of it, we present the construction method of second data perturbation and the operation procedures of aggregation validation for intermediate aggregators and the sink. To resist various external attacks efficiently, the technique of message authentication code is introduced. Security and property analysis show that the proposed scheme can ensure the security of nodes on the premise of lower energy power. In addition, it has a strong ability against data-loss, and both its security and energy efficiency perform better than current works.
  • Related Articles

    [1]Cui Chaoyuan, Li Yonggang, Wu Yun, Wang Licheng. A Memory Forensic Method Based on Hidden Event Trigger Mechanism[J]. Journal of Computer Research and Development, 2018, 55(10): 2278-2290. DOI: 10.7544/issn1000-1239.2018.20180405
    [2]Yi Peng, Zhou Qiao, Men Haosong. Dynamic Social Network Community Detection Algorithm Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2017, 54(11): 2611-2619. DOI: 10.7544/issn1000-1239.2017.20160741
    [3]Tang Wanning, Wang Mingwen, Wan Jianyi. Markov Network Retrieval Model Based on Document Cliques[J]. Journal of Computer Research and Development, 2014, 51(10): 2248-2254. DOI: 10.7544/issn1000-1239.2014.20130343
    [4]Jiang Changhao, Zhang Min, Gao Bin, Liu Yiqun, Ma Shaoping. Advertiser Status Modeling in Sponsored Search[J]. Journal of Computer Research and Development, 2013, 50(12): 2621-2628.
    [5]Wu Caihua, Liu Juntao, Peng Shirui, Li Haihong. Deriving Markov Chain Usage Model from UML Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1811-1819.
    [6]Zhang Zhan, Liu Guangjie, Dai Yuewei, Wang Zhiquan. A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1668-1675.
    [7]Dong Hao, Liu Yuanning, Zhang Hao, Wang Gang. A Method of RNA Secondary Structure Prediction Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2012, 49(4): 812-817.
    [8]Zhao Jing, Huang Houkuan, and Tian Shengfeng. Protocol Anomaly Detection Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2010, 47(4): 621-627.
    [9]Wang Junwen, Liu Guangjie, Dai Yuewei, Zhang Zhan, and Wang Zhiquan. Image Forensics for Blur Detection Based on Nonsubsampled Contourlet Transform[J]. Journal of Computer Research and Development, 2009, 46(9): 1549-1555.
    [10]Duan Jiangjiao, Xue Yongsheng, Lin Ziyu, Wang Wei, Shi Baile. A Novel Hidden Markov Model-Based Hierarchical Time-Series Clustering Algorithm[J]. Journal of Computer Research and Development, 2006, 43(1): 61-67.

Catalog

    Article views (1532) PDF downloads (509) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return