scispace - formally typeset
Search or ask a question
Topic

Data aggregator

About: Data aggregator is a research topic. Over the lifetime, 2615 publications have been published within this topic receiving 40265 citations.


Papers
More filters
Proceedings ArticleDOI
10 Apr 2006
TL;DR: A secure aggregation tree (SAT) is proposed to detect and prevent cheating in large-scale wireless sensor networks and does not require any cryptographic operations when all sensor nodes work honestly.
Abstract: In-network data aggregation in an essential operation to reduce energy consumption in large-scale wireless sensor networks With data aggregation, however, raw data items are invisible to the base station and thus the authenticity of the aggregated data is hard to guarantee A compromised sensor node may forge an aggregation value and mislead the base station into trusting a false reading Due to the stringent constraints of energy supply and computing capability on sensor nodes, it is challenging to detect a compromised sensor node and keep it from cheating This paper proposes a secure aggregation tree (SAT) to detect and prevent cheating Our method is essentially different from other existing solutions in that it does not require any cryptographic operations when all sensor nodes work honestly The detection of cheating is based on the topological constraints in the aggregation tree

41 citations

Patent
20 Jun 2012
TL;DR: In this paper, a data aggregator discovery (DAD) message may be distributed by an associated DAG through the recorded route and via the data aggregators, the DAD message identifying the initiating DAG, and comprising a recorded route taken from the DAG to a receiving particular node as well as a total path cost for the particular node to reach a root node of the DL through the record route and through the data aggregation via the DL.
Abstract: In one embodiment, a data aggregator discovery (DAD) message may be distributed by an associated data aggregator, the DAD message identifying the initiating data aggregator, and comprising a recorded route taken from the data aggregator to a receiving particular node as well as a total path cost for the particular node to reach a root node of the DAG through the recorded route and via the data aggregator The receiving particular node determines a path cost increase (PCI) associated with use of the data aggregator based on the total path cost as compared to a DAG-based path cost for the particular node to reach the root node via the DAG If the PCI is below a configured threshold, the particular node may redirect traffic to the data aggregator as source-routed traffic according to the recorded route The traffic may then be aggregated by the data aggregator, accordingly

40 citations

Journal ArticleDOI
TL;DR: This article introduces and surveys privacy preserving techniques in the processes of data aggregation, trading, and analysis: the balance between data analysis and privacy preservation from the data analysts' perspective, secure data trading from the perspective of data owners and requesters, and secure private data aggregation from theData owners' perspective.
Abstract: Recently, the Internet of Things (IoT) has penetrated many aspects of the physical world to realize different applications. Through IoT, these applications generate, exchange, aggregate, and analyze a vast amount of security-critical and privacy- sensitive data, which makes them attractive targets of attacks. Therefore, it is rather necessary for IoT systems to be equipped with the ability to resist security and privacy risks when fulfilling the desired functional requirements and services. To achieve these goals, there are many new challenges for IoT to implement privacy preserving data manipulation. First, data analysts need to process privacy-sensitive data to extract the expected information without privacy disclosure. In addition, many privacy related factors, including privacy valuation and risk assessment, affect sensitive and private data trading between data owners and requesters. Moreover, the data owners' security behavior also plays an important role in privacy protection in IoT applications. Concerning these issues, this article introduces and surveys privacy preserving techniques in the processes of data aggregation, trading, and analysis: the balance between data analysis and privacy preservation from the data analysts' perspective, secure data trading from the perspective of data owners and requesters, and secure private data aggregation from the data owners' perspective.

40 citations

Journal ArticleDOI
TL;DR: The security analysis indicates that the proposed scheme is proved to be secure in the random oracle model, satisfying all security and privacy requirements, and achieves lowest computation and communication costs, thus appropriate for practical applications.
Abstract: Smart grid, characterized by high efficiency, security, and flexibility, is gradually replacing the traditional power grid. Data aggregation technology is frequently used to avoid user privacy disclosure as a result of power consumption data transmission in the smart grid. However, traditional one-dimensional data aggregation schemes fail to meet the demands of fine-grained analysis. Therefore, this paper proposes an efficient privacy-preserving multi-dimensional data aggregation (P 2 MDA) scheme in smart grid by virtue of homomorphic encryption and superincreasing sequence. The security analysis indicates that the proposed scheme is proved to be secure in the random oracle model, satisfying all security and privacy requirements. The extensive performance analysis shows that in comparison to the related schemes, the proposed scheme achieves lowest computation and communication costs, thus appropriate for practical applications.

40 citations

Journal ArticleDOI
TL;DR: This paper presents a novel energy-efficient secure data aggregation scheme cluster-based private data aggregation (CSDA) based on cluster privacy-preserving that has good flexibility and practical applicability using the slice-assemble technology.
Abstract: With the development of wireless sensor networks, privacy-preserving has become a very important problem in numerous wireless sensor networks (WSN) applications. This paper presents a novel energy-efficient secure data aggregation scheme cluster-based private data aggregation (CSDA) based on cluster privacy-preserving. It has good flexibility and practical applicability using the slice-assemble technology. And, the number of fragments will dynamically change from the change of the network scale. Then, it can reduce communication overhead and energy consumption. Finally, the simulation results show that the proposed aggregation method demonstrates better performance in data aggregation precision, privacy-preserving and communication efficiency than other methods.

40 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless network
122.5K papers, 2.1M citations
91% related
Network packet
159.7K papers, 2.2M citations
89% related
Wireless
133.4K papers, 1.9M citations
89% related
Node (networking)
158.3K papers, 1.7M citations
87% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023104
2022277
2021189
2020207
2019179
2018188