Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks

In recent years, some research used classical and heavyweight encryption technology to realise data privacy and integrity protection in data aggregation of wireless sensor networks. The challenge is the balance between resource constraints and the complexity of the deployment. In this study, the authors proposed a lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks (LIPDA) which has lightweight, secure and easy operability to preserve data privacy and integrity during data aggregation in wireless sensor network. First, a distance-based formation scheme of network topology is presented to balance the energy consumption of cluster heads. Then, a structure of complex number, which composes from the private factor of the nodes and the original data, is composed. The complex number is encrypted by additive homomorphic encryption method, which can realise the data aggregation without any decryption. Also, the reliability of data is ensured by using integrity verification method based on the complex operation. The theoretical analysis and simulation results show that the proposed scheme LIPDA can meet the requirement of privacy protection. Moreover, compared with related work, LIPDA has lower calculation, less traffic, higher accuracy and verifiable completeness.

References

    1. 1)
      • 11. Bergamini, L., Becchetti, L., Vitaletti, A.: ‘Privacy-preserving environment monitoring in networks of mobile devices’. Proc. of the IFIP TC 6th Int. Conf. on Networking, Valencia, Spain, 2011, pp. 179191.
    2. 2)
      • 21. Lee, H., Kim, T.H., Chang, J.W.: ‘An efficient data aggregation scheme for protecting the integrity of sensitive data in wireless sensor networks’. Ubiquitous Information Technologies and Applications, Berlin Heidelberg, 2014, pp. 207214.
    3. 3)
      • 22. Horton, M., Culler, D., Pister, K., et al: ‘The commercialization of microsensor motes’, Sensors, 2002, 19, (4), pp. 4048.
    4. 4)
      • 20. Bista, R., Kim, Y.K., Song, M.S., et al: ‘Improving data confidentiality and integrity for data aggregation in wireless sensor networks’, IEICE Trans. Inf. Syst., 2012, E95-D, (1), pp. 6777.
    5. 5)
      • 9. Chow, C.-Y., Mokbel, M.F., He, T.: ‘A privacy-preserving location monitoring system for wireless sensor networks’, IEEE Trans. Mob. Comput., 2011, 10, (1), pp. 94107.
    6. 6)
      • 6. Xiong, H., Chen, Z., Li, F.: ‘Efficient and multi-level privacy-preserving communication protocol for VANET’, Comput. Electr. Eng., 2012, 38, pp. 573581.
    7. 7)
      • 2. Peng, H., Chen, H., Zhang, X.Y., et al: ‘Location privacy preservation in wireless sensor networks’, J. Softw., 2015, 26, (3), pp. 617639.
    8. 8)
      • 7. Fan, Y.-J., Chen, H.: ‘Verifiable privacy-preserving top-k query protocol in two-tierd sensor networks’, Chin. J. Comput., 2012, 35, (3), pp. 423433.
    9. 9)
      • 5. Liang, X., Barua, M., Lu, R., et al: ‘Health share: achieving secure and privacy-preserving health information sharing through health social networks’, Comput. Commun., 2012, 35, (15), pp. 19101920.
    10. 10)
      • 19. Mlaih, E., Aly, S.A.: ‘Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks’. INFOCOM Workshops 2008, 2008, pp. 16.
    11. 11)
      • 16. Castelluccia, C., Mykletun, E., Tsudik, G.: ‘Efficient aggregation of encrypted data in wireless sensor networks’. The Second Annual Int. Conf. on Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous 2005, 2005, pp. 109117.
    12. 12)
      • 1. Li, J., Gao, H.: ‘Survey on sensor network research’, J. Comput. Res. Dev., 2008, 45, (1), pp. 115.
    13. 13)
      • 14. Ozdemir, S., Xiao, Y.: ‘Integrity protecting hierarchical concealed data aggregation for wireless sensor networks’, Comput. Netw., 2011, 55, (8), pp. 17351746.
    14. 14)
      • 18. Conti, M., Zhang, L., Roy, S., et al: ‘Privacy-preserving robust data aggregation in wireless sensor networks’, Secur. Commun. Netw., 2009, 2, (2), pp. 195213.
    15. 15)
      • 12. He, W., Liu, X., Nguyen, H., et al: ‘PDA: privacy-preserving data aggregation in wireless sensor networks’. Proc. of the 26th IEEE Int. Conf. on Computer Communications (INFOCOM), Anchorage, USA, 2007, pp. 20452053.
    16. 16)
      • 13. He, W.B., Liu, X., Nguyen, H.V., et al: ‘A cluster-based protocol to enforce integrity and preserve privacy in data aggregation’. Proceedings of 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, Canada, 2009, pp. 1419.
    17. 17)
      • 15. Girao, J., Westhoff, D., Schneider, M.: ‘CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks’. Communications, 2005, 2005, pp. 30443049.
    18. 18)
      • 10. Gaikwad, P.B., Dhage, M.R.: ‘Survey on secure data aggregation in wireless sensor networks’. Int. Conf. on Computing Communication Control and Automation (ICCUBEA), 2015, 2015, pp. 242246.
    19. 19)
      • 8. Fan, Y.-J., Chen, H., Zhang, X.-Y.: ‘Data privacy preservation in wireless sensor networks’, Chin. J. Comput., 2012, 35, (6), pp. 11311146.
    20. 20)
      • 4. Chen, J., Fang, B.-X., Yin, L.-H.: ‘A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding’, Chin. J. Comput., 2010, 33, (9), pp. 17361747.
    21. 21)
      • 17. Sun, H.-M., Chen, C.-M., Lin, Y.-H.: ‘RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (4), pp. 727734.
    22. 22)
      • 3. Xu, J., Yang, G., Chen, Z., et al: ‘A survey on the privacy-preserving data aggregation in wireless sensor networks’, Commun. Chin., 2015, 12, (5), pp. 162180.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0387
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0387
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address