Abstract
With the development of wireless sensor networks, privacy-preserving has become a very important problem in numerous wireless sensor networks (WSN) applications. This paper presents a novel energy-efficient secure data aggregation scheme cluster-based private data aggregation (CSDA) based on cluster privacy-preserving. It has good flexibility and practical applicability using the slice-assemble technology. And, the number of fragments will dynamically change from the change of the network scale. Then, it can reduce communication overhead and energy consumption. Finally, the simulation results show that the proposed aggregation method demonstrates better performance in data aggregation precision, privacy-preserving and communication efficiency than other methods.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey [J]. Comput. Netw. 38(4), 393–422 (2002)
Rajagopalan, R., Varshney, P.: Data-aggregation techniques in sensor networks: a survey [J]. IEEE Commun. Surv. Tutor. 8(4), 48–63 (2006)
Jesus, P., Baquero, C., Almeida, P.: A survey of distributed data aggregation algorithms [J]. IEEE Commun. Surv. Tutor. 17(1), 381–404 (2015)
Qayyum, B., Saeed, M., Roberts, J.: Data aggregation in wireless sensor networks with minimum delay and minimum use of energy: a comparative study [C]. In: Mobility, Intelligent Networks and Smart Societies, pp. 573–582 (2015)
Randhawa, S., Jain, S.: Data aggregation in wireless sensor networks: previous research, current status and future directions [J]. Wirel. Pers. Commun. 4, 1–71 (2017)
Acharya, M., Girao, J., Westhoff, D.: Secure comparison of encrypted data in wireless sensor networks [C]. In: Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), Washington, DC, USA, pp. 47–53 (2005)
Armknecht, F., Westhoff, D., Girao, J., Hessler, A.: A lifetime-optimized end to-end encryption scheme for sensor networks allowing in-network processing [J]. Comput. Commun. 31(4), 734–749 (2008)
He, W.B, Liu, X., Hoang, N., et al.: PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks [C]. In: IEEE INFOCOM’07, vol. 28, pp. 2045–2053. IEEE Press (2007)
Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists [J]. In: EURASIP J. Inf. Sec. 2007(1), 1–10 (2007)
Sen J., Maitra S.: An Attack on Privacy-Preserving Data Aggregation Protocol for Wireless Sensor Networks [C]. In: NordSec 2011 LNCS 7161, pp. 205–222 (2012)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks [J]. Commun. ACM 47(6), 53–57 (2004)
Rajalakshmi, M.C., Gnana, P.A.P.: REEDA: routing with energy efficiency data aggregation in wireless sensor network [C]. In: International Conference on Emerging Research in Electronics, Computer Science and Technology. pp. 174–179. IEEE (2016)
Alzaid, H., Foo, E., Nieto, J.M., Park, D.G.: A taxonomy of secure data aggregation in wireless sensor networks [J]. Int. J. Commun. Netw. Distrib. Syst. 8(1), 101–148 (2012)
Man, D., Wang, C., Yang, W., et al.: Energy-efficient cluster-based privacy data aggregation for wireless sensor networks [J]. J. Tsinghua Univ. 57(2), 213–219 (2017)
Yang, G., Wang, A.Q, Cheng, Z.Y, et al.: An energy-saving-preserving data aggregation algorithm [J]. Chin. J. Comput. 34(5), 792–799 (2011)
Pateriya, R.K., Sharma, S.: The evolution of RFID security and privacy: a research survey [C]. In: 2011 International Conference on Communication Systems and Network Technologies IEEE, pp. 116–117 (2011)
Carbunar, B., Yu, Y., Shi, L., et al.: Query privacy in wireless sensor networks [C]. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’07), pp. 203-212. IEEE Computer Society (2007)
Kur, J., Stetsko, A.: Location Privacy Issues in Wireless Sensor Networks [J]. The Future of Identity. In: IFIP AICT vol. 298, pp. 160–169 (2009)
Chen, J., Zhang, H.L.: Survey on wireless sensor network security [J]. J. Harbin Inst. Technol. 43(7), 90–95 (2011)
He, W., Nguyen, H., Liu, X., Nahrstedt, K., AbdeIzaher, T.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks[C]. In: Proceedings of the Military Communications Conference, San Diego, CA, pp. 1–7 (2008)
He, W., Liu, X., Nguyen, H., Nahrstedt, K.: A cluster-based protoc01 to enforce integrity and preserve privacy in data aggregation [C]. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 14–19. Montreal, QC (2009)
Qu, Z.G., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.J.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks [J]. China Commun. 13(7), 108–116 (2016)
Zhang, Y., Sun, X., Baowei, W.: Efficient algorithm for k-barrier coverage based on integer linear programming [J]. China Commun. 13(7), 16–23 (2016)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks [C]. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, USA, pp. 41–47 (2002)
Jaydip, S., Subhamoy, M.: An attack on privacy-preserving data aggregation protocol [C]. Lect. Notes Comput. Sci. 7161, 205–222 (2012)
Acknowledgements
This work was supported in part by Soft Science Program of China Meteorological Administration (2017[29]), the Priority Academic Program Development of Jiangsu Higher Education Institutions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fang, W., Wen, X., Xu, J. et al. CSDA: a novel cluster-based secure data aggregation scheme for WSNs. Cluster Comput 22 (Suppl 3), 5233–5244 (2019). https://doi.org/10.1007/s10586-017-1195-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1195-7