Open Access   Article Go Back

Privacy Preserving Data Aggregation and Data Integrity in WSN

Maharajan K.1 , R. Vadivel2

Section:Research Paper, Product Type: Journal Paper
Volume-10 , Issue-5 , Page no. 53-57, May-2022

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v10i5.5357

Online published on May 31, 2022

Copyright © Maharajan K., R. Vadivel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Maharajan K., R. Vadivel, “Privacy Preserving Data Aggregation and Data Integrity in WSN,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.5, pp.53-57, 2022.

MLA Style Citation: Maharajan K., R. Vadivel "Privacy Preserving Data Aggregation and Data Integrity in WSN." International Journal of Computer Sciences and Engineering 10.5 (2022): 53-57.

APA Style Citation: Maharajan K., R. Vadivel, (2022). Privacy Preserving Data Aggregation and Data Integrity in WSN. International Journal of Computer Sciences and Engineering, 10(5), 53-57.

BibTex Style Citation:
@article{K._2022,
author = {Maharajan K., R. Vadivel},
title = {Privacy Preserving Data Aggregation and Data Integrity in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2022},
volume = {10},
Issue = {5},
month = {5},
year = {2022},
issn = {2347-2693},
pages = {53-57},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5468},
doi = {https://doi.org/10.26438/ijcse/v10i5.5357}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i5.5357}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5468
TI - Privacy Preserving Data Aggregation and Data Integrity in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Maharajan K., R. Vadivel
PY - 2022
DA - 2022/05/31
PB - IJCSE, Indore, INDIA
SP - 53-57
IS - 5
VL - 10
SN - 2347-2693
ER -

VIEWS PDF XML
203 383 downloads 123 downloads
  
  
           

Abstract

Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable.” Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.

Key-Words / Index Term

Concealed Data Aggregation, Wireless sensor networks, privacy homomorphism encryption

References

[1] R. Rajagopalan and P. Varshney, “Data-Aggregation Techniques in Sensor Networks: A Survey,” IEEE Comm. Surveys Tutorials, vol.8, no.4, pp.48-63, Oct.-Nov. 2006.
[2] S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, “TAG:A Tiny Aggregation Service for Ad-Hoc Sensor Networks,”Proc. Fifth Symp. Operating Systems Design and Implementation,2002.
[3]J.-Y. Chen, G. Pandurangan, and D. Xu, “Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis,” IEEE Trans. Parallel Distributed Systems, vol.17, no.9, pp.987-1000, Sept.2006.
[4] H.C¸ am, S. O ¨ zdemir, P. Nair, D. Muthuavinashiappan, and H.Ozgur Sanli, “Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks,” J. Computer Comm., vol.29, pp.446-455, 2006.
[5] H.Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks,”Proc. IEEE 60th Int’l Conf. Vehicular Technology (VTC ’04-Fall),vol.7, pp.4650-4654, Sep det. 2004.