Browse > Article
http://dx.doi.org/10.3837/tiis.2016.09.023

PAPG: Private Aggregation Scheme based on Privacy-preserving Gene in Wireless Sensor Networks  

Zeng, Weini (The 716TH Research Institute, China Shipbuilding Industry Corporation)
Chen, Peng (The 716TH Research Institute, China Shipbuilding Industry Corporation)
Chen, Hairong (The 716TH Research Institute, China Shipbuilding Industry Corporation)
He, Shiming (School of Computer and Communication Engineering, Changsha University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.9, 2016 , pp. 4442-4466 More about this Journal
Abstract
This paper proposes a privacy-preserving aggregation scheme based on the designed P-Gene (PAPG) for sensor networks. The P-Gene is constructed using the designed erasable data-hiding technique. In this P-Gene, each sensory data item may be hidden by the collecting sensor node, thereby protecting the privacy of this data item. Thereafter, the hidden data can be directly reported to the cluster head that aggregates the data. The aggregation result can then be recovered from the hidden data in the cluster head. The designed P-Genes can protect the privacy of each data item without additional data exchange or encryption. Given the flexible generation of the P-Genes, the proposed PAPG scheme adapts to dynamically changing reporting nodes. Apart from its favorable resistance to data loss, the extensive analyses and simulations demonstrate how the PAPG scheme efficiently preserves privacy while consuming less communication and computational overheads.
Keywords
Wireless Sensor Networks; Privacy-preserving Gene; Data Aggregation; Privacy; Distributed System;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Z Shi, R Sun, R Lu, Le Chen, J Chen, X Shen, “Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications,” IEEE Transactions on Smart Grid, vol.6, no.6, pp.2856 - 2868, July, 2015. Article (CrossRef Link)   DOI
2 H Bao and R Lu, “A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications,” IEEE Internet of Things Journal, vol.2, no.3, pp.248 - 258, June 2015. Article (CrossRef Link)   DOI
3 J Won, C Ma, D Yau and N Rao, “Proactive fault-tolerant aggregation protocol for privacy-assured smart metering,” in Proc. of IEEE INFOCOM, pp. 2804-2812, 2014. Article (CrossRef Link)
4 J Zhao, T Jung, Y Wang and X Li., “Achieving differential privacy of data disclosure in the smart grid,” in Proc. of IEEE INFOCOM, pp. 504-512, 2014. Article (CrossRef Link)
5 Z Fu, K Ren, J Shu, X Sun, and F Huang, "Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement," IEEE Transactions on Parallel and Distributed Systems, vol. E98-B, pp.190-200, Jan.2015. Article (CrossRef Link)
6 D Djenouri, M Bagaa, “Synchronization Protocols and Implementation Issues in Wireless Sensor Networks: A Review,” IEEE Systems Journal, vol.10, No. 2, pp. 617-627, Feb. 2016. Article (CrossRef Link)   DOI
7 X Guan, L Guan, X Wang, “A novel energy efficient clustering technique based on virtual hexagon for wireless sensor networks,” International Journal of Innovative Computing, Information and Control, vol. 7, pp. 1891-1904, Apr. 2011. Article (CrossRef Link)
8 P Mukherjee, S Sen, “Comparing reputation schemes for detecting malicious nodes in sensor networks[J],” Computer Journal, vol. 54, pp. 482-489, Mar. 2011. Article (CrossRef Link)   DOI
9 W Zhang, M Tran, S Zhu, et al., “A random perturbation-based scheme for pairwise key establishment in sensor networks,” in Proc. of MobiHoc'07: Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 90-99, 2007. Article (CrossRef Link)
10 F Ali, B Mehdi, S Hossein, et al., “A high performance and intrinsically secure key establishment protocol for wireless sensor networks,” Computer Networks, vol. 55, pp. 1849-1863, Aug. 2011. Article (CrossRef Link)   DOI
11 H Zhang, P Cheng, L Shi, and J Chen, “Optimal DoS Attack Scheduling in Wireless Networked Control System,” IEEE Transactions on Control System Technology, Vol. 24, pp. 843-852, May 2016. Article (CrossRef Link)   DOI
12 M Rezvani, A Ignjatovic, E Bertino, and S Jha, “Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks,” IEEE transactions on Dependable and Secure Computing, vol. 12, pp.98-110, Jan. 2015. Article (CrossRef Link)   DOI
13 L Yang, C Ding, and M Wu, “RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, vol. 9, pp. 5189-5208, Dec. 2015. Article (CrossRef Link)
14 S Zhu, S Setia, S Jajodia, et al., “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,” in Proc. of IEEE Symposium on Security and Privacy, pp.259-271, 2004. Article (CrossRef Link)
15 L. Zhu, Z. Yang, M. Li, and D. Liu, "An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-9, Jun. 2013. Article (CrossRef Link)   DOI
16 T Feng, C Wang, and W Zhang, et al., “Confidentiality Protection for Distributed Sensor Data Aggregation,” in Proc. of IEEE INFOCOM, pp.131-146, 2008. Article (CrossRef Link)
17 C Castelluccia, A Chan, E Mykletun, et al., “Efficient and provably secure aggregation of encrypted data in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 5, pp. 1-36, Mar. 2009. Article (CrossRef Link)   DOI
18 R Rivest, L Adleman, M Dertouzos, “On data banks and privacy homomorphism. Foundations of Secure Computation,” New York: Academic Press, pp.169-179, 1978. Article (CrossRef Link)
19 J Girao, D Westhoff, and M. Schneider, “CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks,” in Proc. of 2005 IEEE International Conference on Communications, 2005. (ICC 2005), pp.3044-3049, 2005. Article (CrossRef Link)
20 Q. Zhou, G. Yang, and L. He, “A Secure-Enhanced Data Aggregation Based on ECC in Wireless sensor Networks,” Sensors (Basel, Switzerland), vol.14, pp. 6701-6721, Apr.2014. Article (CrossRef Link)   DOI
21 W Zhang, C Wang, T Feng, “GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data,” in Proc. of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008, pp.179-184, 2008. Article (CrossRef Link)
22 S Huang, S Shieh, J Tygar, “Secure encrypted-data aggregation for wireless sensor networks,” Wireless Networks, vol.16, pp. 915-927, Mar. 2010. Article (CrossRef Link)   DOI
23 M Groat, W He, S Forrest, “KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks,” in Proc. of INFOCOM 2011: 30th IEEE International Conference on Computer Communications, pp. 2024-2032, 2011. Article (CrossRef Link)
24 H Zhang, Y Shu, P Cheng, and J Chen, “Privacy and Performance Trade-off in Cyber-Physical Systems,” IEEE Network, vol. 30, pp. 62-66, March-April, 2016. Article (CrossRef Link)   DOI
25 I.F Akyildiz, W Su, Y Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, pp.393-422, Mar. 2002. Article (CrossRef Link)   DOI
26 S Madden, M Franklin, J Hellerstein, and W Hong, “Tag: a tiny aggregation service for ad-hoc sensor networks,” SIGOPS Oper. yst.Rev., vol. 36, pp.131-146, 2002. Article (CrossRef Link)   DOI
27 J Xu, G Yang, Z Chen, Q Wang, “A survey on the privacy-preserving data aggregation in wireless sensor networks,” IEEE Journals & Magazines, vol. 12, pp.162-180, May. 2015. Article (CrossRef Link)
28 W He, X Liu, and H Nguyen, et al., “PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks,” in Proc. of IEEE INFOCOM 2007, pp. 2045-2053, 2007. Article (CrossRef Link)
29 M Conti, L Zhang, S Roy, et al., “Privacy-preserving robust data aggregation in wireless sensor networks,” Security and Communication Networks, vol. 2, n 2, pp. 195-213, March/April 2009. Article (CrossRef Link)   DOI
30 W Zeng, Y Lin, J Yu, S He and Lei Wang, “Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks,” Adhoc & Sensor Wireless Networks, vol. 21, pp. 21-58, Jan/Feb. 2014. Article (CrossRef Link)
31 T Jung, F Mao, X Li, et al., “Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation,” in Proc. of INFOCOM 2013: 32th IEEE International Conference on Computer Communications, pp.2634-2642, 2013. Article (CrossRef Link)
32 C Castelluccia, E Mykletun, G Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” in Proc. of MobiQuitous 2005, pp. 109-117, 2005. Article (CrossRef Link)