Privacy Preserving Data Aggregation and Data Integrity in WSN
Maharajan K.1 , R. Vadivel2
Section:Research Paper, Product Type: Journal Paper
Volume-10 ,
Issue-5 , Page no. 53-57, May-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i5.5357
Online published on May 31, 2022
Copyright © Maharajan K., R. Vadivel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Maharajan K., R. Vadivel, “Privacy Preserving Data Aggregation and Data Integrity in WSN,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.5, pp.53-57, 2022.
MLA Style Citation: Maharajan K., R. Vadivel "Privacy Preserving Data Aggregation and Data Integrity in WSN." International Journal of Computer Sciences and Engineering 10.5 (2022): 53-57.
APA Style Citation: Maharajan K., R. Vadivel, (2022). Privacy Preserving Data Aggregation and Data Integrity in WSN. International Journal of Computer Sciences and Engineering, 10(5), 53-57.
BibTex Style Citation:
@article{K._2022,
author = {Maharajan K., R. Vadivel},
title = {Privacy Preserving Data Aggregation and Data Integrity in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2022},
volume = {10},
Issue = {5},
month = {5},
year = {2022},
issn = {2347-2693},
pages = {53-57},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5468},
doi = {https://doi.org/10.26438/ijcse/v10i5.5357}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i5.5357}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5468
TI - Privacy Preserving Data Aggregation and Data Integrity in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Maharajan K., R. Vadivel
PY - 2022
DA - 2022/05/31
PB - IJCSE, Indore, INDIA
SP - 53-57
IS - 5
VL - 10
SN - 2347-2693
ER -
VIEWS | XML | |
303 | 469 downloads | 152 downloads |
Abstract
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable.” Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.
Key-Words / Index Term
Concealed Data Aggregation, Wireless sensor networks, privacy homomorphism encryption
References
[1] R. Rajagopalan and P. Varshney, “Data-Aggregation Techniques in Sensor Networks: A Survey,” IEEE Comm. Surveys Tutorials, vol.8, no.4, pp.48-63, Oct.-Nov. 2006.
[2] S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, “TAG:A Tiny Aggregation Service for Ad-Hoc Sensor Networks,”Proc. Fifth Symp. Operating Systems Design and Implementation,2002.
[3]J.-Y. Chen, G. Pandurangan, and D. Xu, “Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis,” IEEE Trans. Parallel Distributed Systems, vol.17, no.9, pp.987-1000, Sept.2006.
[4] H.C¸ am, S. O ¨ zdemir, P. Nair, D. Muthuavinashiappan, and H.Ozgur Sanli, “Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks,” J. Computer Comm., vol.29, pp.446-455, 2006.
[5] H.Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks,”Proc. IEEE 60th Int’l Conf. Vehicular Technology (VTC ’04-Fall),vol.7, pp.4650-4654, Sep det. 2004.