Skip to main content

Advertisement

Log in

CSDA: a novel cluster-based secure data aggregation scheme for WSNs

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the development of wireless sensor networks, privacy-preserving has become a very important problem in numerous wireless sensor networks (WSN) applications. This paper presents a novel energy-efficient secure data aggregation scheme cluster-based private data aggregation (CSDA) based on cluster privacy-preserving. It has good flexibility and practical applicability using the slice-assemble technology. And, the number of fragments will dynamically change from the change of the network scale. Then, it can reduce communication overhead and energy consumption. Finally, the simulation results show that the proposed aggregation method demonstrates better performance in data aggregation precision, privacy-preserving and communication efficiency than other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey [J]. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Rajagopalan, R., Varshney, P.: Data-aggregation techniques in sensor networks: a survey [J]. IEEE Commun. Surv. Tutor. 8(4), 48–63 (2006)

    Article  Google Scholar 

  3. Jesus, P., Baquero, C., Almeida, P.: A survey of distributed data aggregation algorithms [J]. IEEE Commun. Surv. Tutor. 17(1), 381–404 (2015)

    Article  Google Scholar 

  4. Qayyum, B., Saeed, M., Roberts, J.: Data aggregation in wireless sensor networks with minimum delay and minimum use of energy: a comparative study [C]. In: Mobility, Intelligent Networks and Smart Societies, pp. 573–582 (2015)

  5. Randhawa, S., Jain, S.: Data aggregation in wireless sensor networks: previous research, current status and future directions [J]. Wirel. Pers. Commun. 4, 1–71 (2017)

    Google Scholar 

  6. Acharya, M., Girao, J., Westhoff, D.: Secure comparison of encrypted data in wireless sensor networks [C]. In: Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), Washington, DC, USA, pp. 47–53 (2005)

  7. Armknecht, F., Westhoff, D., Girao, J., Hessler, A.: A lifetime-optimized end to-end encryption scheme for sensor networks allowing in-network processing [J]. Comput. Commun. 31(4), 734–749 (2008)

    Article  Google Scholar 

  8. He, W.B, Liu, X., Hoang, N., et al.: PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks [C]. In: IEEE INFOCOM’07, vol. 28, pp. 2045–2053. IEEE Press (2007)

  9. Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists [J]. In: EURASIP J. Inf. Sec. 2007(1), 1–10 (2007)

    Article  Google Scholar 

  10. Sen J., Maitra S.: An Attack on Privacy-Preserving Data Aggregation Protocol for Wireless Sensor Networks [C]. In: NordSec 2011 LNCS 7161, pp. 205–222 (2012)

  11. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks [J]. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  12. Rajalakshmi, M.C., Gnana, P.A.P.: REEDA: routing with energy efficiency data aggregation in wireless sensor network [C]. In: International Conference on Emerging Research in Electronics, Computer Science and Technology. pp. 174–179. IEEE (2016)

  13. Alzaid, H., Foo, E., Nieto, J.M., Park, D.G.: A taxonomy of secure data aggregation in wireless sensor networks [J]. Int. J. Commun. Netw. Distrib. Syst. 8(1), 101–148 (2012)

    Article  Google Scholar 

  14. Man, D., Wang, C., Yang, W., et al.: Energy-efficient cluster-based privacy data aggregation for wireless sensor networks [J]. J. Tsinghua Univ. 57(2), 213–219 (2017)

    Google Scholar 

  15. Yang, G., Wang, A.Q, Cheng, Z.Y, et al.: An energy-saving-preserving data aggregation algorithm [J]. Chin. J. Comput. 34(5), 792–799 (2011)

  16. Pateriya, R.K., Sharma, S.: The evolution of RFID security and privacy: a research survey [C]. In: 2011 International Conference on Communication Systems and Network Technologies IEEE, pp. 116–117 (2011)

  17. Carbunar, B., Yu, Y., Shi, L., et al.: Query privacy in wireless sensor networks [C]. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’07), pp. 203-212. IEEE Computer Society (2007)

  18. Kur, J., Stetsko, A.: Location Privacy Issues in Wireless Sensor Networks [J]. The Future of Identity. In: IFIP AICT vol. 298, pp. 160–169 (2009)

  19. Chen, J., Zhang, H.L.: Survey on wireless sensor network security [J]. J. Harbin Inst. Technol. 43(7), 90–95 (2011)

    Google Scholar 

  20. He, W., Nguyen, H., Liu, X., Nahrstedt, K., AbdeIzaher, T.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks[C]. In: Proceedings of the Military Communications Conference, San Diego, CA, pp. 1–7 (2008)

  21. He, W., Liu, X., Nguyen, H., Nahrstedt, K.: A cluster-based protoc01 to enforce integrity and preserve privacy in data aggregation [C]. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 14–19. Montreal, QC (2009)

  22. Qu, Z.G., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.J.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks [J]. China Commun. 13(7), 108–116 (2016)

    Article  Google Scholar 

  23. Zhang, Y., Sun, X., Baowei, W.: Efficient algorithm for k-barrier coverage based on integer linear programming [J]. China Commun. 13(7), 16–23 (2016)

    Article  Google Scholar 

  24. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks [C]. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, USA, pp. 41–47 (2002)

  25. Jaydip, S., Subhamoy, M.: An attack on privacy-preserving data aggregation protocol [C]. Lect. Notes Comput. Sci. 7161, 205–222 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by Soft Science Program of China Meteorological Administration (2017[29]), the Priority Academic Program Development of Jiangsu Higher Education Institutions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Fang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fang, W., Wen, X., Xu, J. et al. CSDA: a novel cluster-based secure data aggregation scheme for WSNs. Cluster Comput 22 (Suppl 3), 5233–5244 (2019). https://doi.org/10.1007/s10586-017-1195-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1195-7

Keywords

Navigation