Abstract
The existing privacy-preserving aggregation query processing methods in sensor networks rely on pre-established network topology and require all nodes in the network to participate in query processing. Maintaining the topology results in a large amount of energy overhead, and in many cases, the user is interested only in the aggregated query results of some areas in the network, and thus, the participation of the entire network node is not necessary. Aiming to solve this problem, this paper proposes a spatial range aggregation query algorithm for a dynamic sensor network with privacy protection (E2PDA – Energy-efficient Privacy-preserving Data Aggregation). The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. The analysis and experimental results show that the proposed algorithm outperforms the existing algorithms in terms of energy and privacy protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xu, Y., Lee, W.-C., Xu, J., Mitchell, G.: Processing window queries in wireless sensor networks. In: Proceedings of the 22nd International Conference on data Engineering, pp. 70–80. IEEE Computer Society (2006)
He, W., Liu, X., Nguyen, H., et al.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp. 2045–2053. IEEE (2007)
Wang, T., Qin, X., Ding, Y., et al.: Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks. Wirel. Pers. Commun. 98(1), 665–684 (2018)
Akila, V., Sheela, T.: Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks. In: International Conference on Computing and Communications Technologies, pp. 282–287. IEEE (2017)
Hua, P., Liu, X., Yu, J., et al.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018)
Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55(8), 1735–1746 (2011)
Elhoseny, M., Yuan, X., El-Minir, H.K., et al.: An energy efficient encryption method for secure dynamic WSN. Secur. Commun. Netw. 9(13), 2024–2031 (2016)
Fang, W., Wen, X.Z., Xu, J., et al.: CSDA: a novel cluster-based secure data aggregation scheme for WSNs. Clust. Comput. 4, 1–12 (2017)
Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, New York, pp. 243–254 (2000)
Coman, A., Sander, J., Nascimento, M.A.: Adaptive Processing of Historical Spatial Range Queries in Peer-to-Peer Sensor Networks. Kluwer Academic Publishers (2007)
Rappaport, T.: Wireless Communications: Principles and Practice. Prentice-Hall Press, New Jersey (1996)
Acknowledgments
The research work was supported by the Aeronautical Science Foundation of China (Grant No. 20165515001), the National Natural Science Foundation of China under (Grant No. 61402225), State Key Laboratory for smart grid protection and operation control Foundation, Science and Technology Funds from National State Grid Ltd.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, L., Hu, Z., Liu, L. (2019). Privacy-Preserving and Dynamic Spatial Range Aggregation Query Processing in Wireless Sensor Networks. In: Li, G., Yang, J., Gama, J., Natwichai, J., Tong, Y. (eds) Database Systems for Advanced Applications. DASFAA 2019. Lecture Notes in Computer Science(), vol 11448. Springer, Cham. https://doi.org/10.1007/978-3-030-18590-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-18590-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-18589-3
Online ISBN: 978-3-030-18590-9
eBook Packages: Computer ScienceComputer Science (R0)