Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0131

Privacy-Preserving, Energy-Saving Data Aggregation Scheme in Wireless Sensor Networks  

Zhou, Liming (School of Computer and Information Engineering, Henan University)
Shan, Yingzi (Dept. of Finance, Yellow River Conservancy Technical Institute)
Publication Information
Journal of Information Processing Systems / v.16, no.1, 2020 , pp. 83-95 More about this Journal
Abstract
Because sensor nodes have limited resources in wireless sensor networks, data aggregation can efficiently reduce communication overhead and extend the network lifetime. Although many existing methods are particularly useful for data aggregation applications, they incur unbalanced communication cost and waste lots of sensors' energy. In this paper, we propose a privacy-preserving, energy-saving data aggregation scheme (EBPP). Our method can efficiently reduce the communication cost and provide privacy preservation to protect useful information. Meanwhile, the balanced energy of the nodes can extend the network lifetime in our scheme. Through many simulation experiments, we use several performance criteria to evaluate the method. According to the simulation and analysis results, this method can more effectively balance energy dissipation and provide privacy preservation compared to the existing schemes.
Keywords
Data Aggregation; Energy-Balanced; Privacy Preservation; Wireless Sensor Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Wang, X. Qin, Y. Ding, L. Liu, and Y. Luo, "Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks," Wireless Personal Communications, vol. 98, no. 1, pp. 665-684, 2018.   DOI
2 J. Zhang, J. Zhu, Z. Jia, and X. Yan, "A secret confusion based energy-saving and privacy-preserving data aggregation algorithm," Chinese Journal of Electronics, vol. 26, no. 4, pp. 740-746, 2017.   DOI
3 X. Zhao, J. Zhu, X. Liang, S. Jiang, and Q. Chen, "Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks," IET Information Security, vol. 11, no. 2, pp. 82-88, 2017.   DOI
4 C. Chen, Y. Lin, Y. Lin, and H. Sun, "RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 4, pp. 727-734, 2012.   DOI
5 B. Gupta, D. P. Agrawal, and S. Yamaguchi, Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. Hershey, PA: IGI Global, 2016.
6 C. Stergiou, K. E. Psannis, B. G. Kim, and B. Gupta, "Secure integration of IoT and cloud computing," Future Generation Computer Systems, vol. 78, pp. 964-975, 2018.   DOI
7 A. P. Plageras, K. E. Psannis, C. Stergiou, H. Wang, and B. B. Gupta, "Efficient IoT-based sensor big data collection: processing and analysis in smart buildings," Future Generation Computer Systems, vol. 82, pp. 349-357, 2018.   DOI
8 C. T. Li and M. S. Hwang, "A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks," Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011.   DOI
9 N. T. T. Huyen, M. Jo, T. D. Nguyen, and E. N. Huh, "A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks," Security and Communication Networks, vol. 5, no. 5, pp. 485-495, 2012.   DOI
10 D. Du, H. Xiong, and H. Wang, "An efficient key management scheme for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 8, no. 1, article no. 406254, 2012.
11 P. Levis, N. Lee, M. Welsh, and D. Culler, "Tossim: accurate and scalable simulation of entire TinyOS applications," in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, 2003, pp. 126-137.
12 M. A. Alsmirat, Y. Jararweh, I. Obaidat, and B. B. Gupta, "Automated wireless video surveillance: an evaluation framework," Journal of Real-Time Image Processing, vol. 13, no. 3, pp. 527-546, 2017.   DOI
13 N. Cao, P. Liu, G. Li, C. Zhang, S. Cao, G. Cao, M. Yan, and B. B. Gupta, "Evaluation models for the nearest closer routing protocol in wireless sensor networks," IEEE Access, vol. 6, pp. 77043-77054, 2018.   DOI
14 S. Ozdemir, M. Peng, and Y. Xiao, "PRDA: polynomial regression‐based privacy‐preserving data aggregation for wireless sensor networks," Wireless Communications and Mobile Computing, vol. 15, no. 4, pp. 615-628, 2015.   DOI
15 Fu, S., Ma, J., Li, H., & Wang, C. (2013). Energy-balanced separating algorithm for cluster-based data aggregation in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(1), 570805.   DOI
16 E. Zeydan, D. Kivanc, C. Comaniciu, and U. Tureli, "Energy efficient routing for correlated data in wireless sensor networks," Ad Hoc Networks, vol. 10, no. 6, pp. 962-975, 2012.   DOI
17 J. T. Meng, J. R. Yuan, S. Z. Feng, and Y. J. Wei, "An energy efficient clustering scheme for data aggregation in wireless sensor networks," Journal of Computer Science and Technology, vol. 28, no. 3, pp. 564-573, 2013.   DOI
18 W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: privacy-preserving data aggregation in wireless sensor networks," in Proceeding of the 26th IEEE International Conference on Computer Communications (INFOCOM), Barcelona, Spain, 2007, pp. 2045-2053.
19 H. Li, K. Lin, and K. Li, "Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks," Computer Communications, vol. 34, no. 4, pp. 591-597, 2011.   DOI
20 C. X. Liu, Y. Liu, Z. J. Zhang, and Z. Y. Cheng, "High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks," International Journal of Communication Systems, vol. 26, no. 3, pp. 380-394, 2013.   DOI
21 M. Elhoseny, X. Yuan, H. K. El-Minir, and A. M. Riad, "An energy efficient encryption method for secure dynamic WSN," Security and Communication Networks, vol. 9, no. 13, pp. 2024-2031, 2016.   DOI
22 L. Yu, J. Li, S. Cheng, S. Xiong, and H. Shen, "Secure continuous aggregation in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 3, pp. 762-774, 2014.   DOI
23 M. Elhoseny, H. Elminir, A. Riad, and X. Yuan, "A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption," Journal of King Saud University-Computer and Information Sciences, vol. 28, no. 3, pp. 262-275, 2016.   DOI
24 S. Ji, J. S., He, Y. Pan, and Y. Li, "Continuous data aggregation and capacity in probabilistic wireless sensor networks," Journal of Parallel and Distributed Computing, vol. 73, no. 6, pp. 729-745, 2013.   DOI