scispace - formally typeset
Journal ArticleDOI

Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks

Reads0
Chats0
TLDR
This article proposes an energy-efficient and privacy-preserving data aggregation algorithm (EPDA), which requires only the data sensed by the tail nodes of the chains to be sliced to ensure privacy.
Abstract
Privacy-preserving data aggregation is a kind of fundamental and essential algorithm for wireless sensor networks. However, the existing aggregation algorithms consume a large amount of energy to assure sensory data security. In this article, we propose an energy-efficient and privacy-preserving data aggregation algorithm (EPDA). We organize a sensor network into a tree and connect the leaf nodes of the tree to form many chains. EPDA requires only the data sensed by the tail nodes of the chains to be sliced to ensure privacy. Also, EPDA significantly decreases energy consumption and prolongs the lifetime of the network. We compare our scheme with the existing schemes through theoretical analysis and simulations. The analysis and simulation results show that EPDA outperforms the existing schemes.

read more

Citations
More filters
Journal ArticleDOI

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

TL;DR: This paper categorizes secure data aggregation methods in wireless sensor networks based on network model, network topology, key cryptography technique, encryption method, application, authentication mechanism, and data recovery ability and believes that this taxonomy can help researchers to design secure and efficient data aggregating methods.
Journal ArticleDOI

CHESDA: continuous hybrid and energy-efficient secure data aggregation for WSN

TL;DR: Results of analysis and simulations indicate that CHESDA, compared to PECDA and SMART, is more energy-efficient and highly secure with lower communication overhead and privacy preserving is maintained by slice-mixing technique.
Journal ArticleDOI

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices

TL;DR: PANDA as mentioned in this paper is a lightweight non-interactive privacy-preserving data aggregation scheme for resource-constrained devices, where TEE is introduced to bypass the trusted entities requirement and heavy overhead.
Journal ArticleDOI

Hierarchical Fractional Quantized Kernel Least mean Square Filter in Wireless Sensor Network for Data Aggregation

TL;DR: A Hierarchical Fractional quantized kernel least mean square (HFQKLMS) filter was devised for data aggregation in WSN and obtained less energy consumption, and a prediction error of 7.45 based on 100 nodes in the localization database.
Journal ArticleDOI

A Robust and Optional Privacy Data Aggregation Scheme for Fog-Enhanced IoT Network

TL;DR: In this paper , an optional privacy-preserving data aggregation scheme based on BGN homomorphic encryption is proposed, without any trusted third party, which is satisfactory in terms of computation cost and communication overhead.
References
More filters
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI

TAG: a Tiny AGgregation service for Ad-Hoc sensor networks

TL;DR: This work presents the Tiny AGgregation (TAG) service for aggregation in low-power, distributed, wireless environments, and discusses a variety of optimizations for improving the performance and fault tolerance of the basic solution.
Proceedings ArticleDOI

PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks

TL;DR: This work presents two privacy-preserving data aggregation schemes for additive aggregation functions that combine clustering protocol and algebraic properties of polynomials, and builds on slicing techniques and the associative property of addition.
Journal ArticleDOI

A new authenticated key agreement for session initiation protocol

TL;DR: It is shown that the scheme of Yoon et al. is still vulnerable to stolen‐verifier attack and may also suffer from off‐line password guessing attack and a new security‐enhanced authentication scheme for SIP is proposed that maintains low computational complexity.
Journal ArticleDOI

Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

TL;DR: A novel integrity protecting hierarchical concealed data aggregation protocol that allows the aggregation of data packets that are encrypted with different encryption keys and during the decryption of aggregation, the base station is able to classify the encrypted and aggregated data based on the encryption keys.
Related Papers (5)