skip to main content
10.1145/1982185.1982279acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

REBIVE: a reliable private data aggregation scheme for wireless sensor networks

Published:21 March 2011Publication History

ABSTRACT

An important topic addressed by the wireless sensor networks community over the last several years is the in-net work data aggregation. It is significant as well as a challenging issue to provide reliable data aggregation scheme while preserving data privacy. However, in WSNs, achieving ideal data accuracy is complicated due to collision, heavy network traffic, processing delays and/or several attacks. The problem of gathering accurate integrated data will be further intensified if the environment is adverse. Hence how to attain data privacy and perfect data accuracy are two major challenges for data aggregation in wireless sensor networks. To address this problem, we propose in this paper a new privacy preserving data aggregation scheme. We present REBIVE (REliaBle prIVate data aggregation scheme). In REBIVE the data accuracy maintenance and data privacy protection mechanisms work cooperatively. Different from past research, our proposed solution have the following features: providing privacy preservation technique for individual sensor data and aggregated sensor data; maintaining perfect data accuracy for realistic environments; being highly efficient; and being robust to popular attacks launched in WSNs.

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. A survey on sensor networks. In IEEE Communications Magazine, Vol. 40, Ed. 8. 2002. 102--114 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor networks. In proceedings of the conference on Embedded networked sensor systems (SenSys). ACM Press. 2003. 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Madden, S., Franklin, M. J., and Hellerstein, J. M. TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks. In Proceedings of the symposium on Operating systems design and implementation. ACM Press. 2002. 131--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. PDA: Privacy-preserving Data Aggregation in Wire less Sensor Networks. In Proceedings of INFOCOM. 2007. 2045--2053.Google ScholarGoogle Scholar
  5. Zhang, W., Wang, C., and Feng, T. GP2S: generic privacy preservation solutions for approximate aggregation of sensor data. In Proceedings of Conference on Pervasive Computing and Communications. 2008. 179--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. He, W. and Liu, X. and Nguyen, H. and Nahrstedt, K. A Cluster-Based Protocol to Enforce Integrity and Pre serve Privacy in Data Aggregation. In Proceedings of the Conference on Distributed Computing Systems Workshops. IEEE Computer Society. 2009. 14--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks. In Proceeding of MILCOM. IEEE Computer Society. 2008. 1--7.Google ScholarGoogle Scholar
  8. Castelluccia, C., Mykletun, E., and Tsudik, G. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. Proceeding of Mobiquitous. 2005. 109--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Eschenauer, L., and Gligor, V. D. A key-management scheme for distributed sensor networks. In Proceedings of Conference on Computer and Communications Security. ACM Press. 2002. 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Shamir, A. How to share a secret. In Communication of. ACM vol. 22, no. 11. ACM Press. 1979. 612--613. http://dx.doi.org/10.1145/359168.359176 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Intanagonwiwat, Estrin, C., D., Govindan, R. and Heidemann, J. Impact of Network Density on Data Aggregation in Wireless Sensor Networks. In Proceedings of Conference on Distributed Computing Systems, 2002. 457. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Deshpande, A., Nath, S. P., Gibbons, B., and Seshan, S. Cache-and-query for wide area sensor databases. In Proceedings of SIGMOD. 2003. 503--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Solis, I., and Obraczka, K. The impact of timing in data aggregation for sensor networks. In Proceedings of ICC. 2004. 3640--3645.Google ScholarGoogle Scholar
  14. Abdelzaher, T., He, T., and Stankovic, J. Feedback Control of Data Aggregation in Sensor Networks. In Proceedings Conference on Decision and Control. 2004. 1490--1495.Google ScholarGoogle ScholarCross RefCross Ref
  15. Chen, J. Y., Pandurangan, G. and Xu, D. Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis. In Proceedings of IPSN. 2005. 348--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Tang, X., and Xu, J. Extending network lifetime for precision constrained data aggregation in wireless sensor networks. In Proceedings of INFOCOM, 2006. 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  17. Itanagonwiwat, C., Govindan, R., and Estrin, D. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proc. of MobiCom. 2002. 56--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Agrawal, R. and Srikant, R. Privacy preserving data mining. In Proceedings of SIGMOD Conference Management of Data. 2000. 439--450. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kargupta, H., Datta, Q. W. S., and Sivakumar, K. On The Privacy Preserving Properties of Random Data Perturbation Techniques. In Proceedings of the Conference on Data Mining. 2003. 99--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Huang, Z., Du, W., and Chen, B., Deriving Private Information from Randomized Data. In Proceedings of the ACM SIGMOD Conference. 2005. 37--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Du, W., and Atallah, M. J. Secure multi-party computation problems and their applications: A review and open problems. In Proceedings of the Workshop on New Security Paradigms. 2001. 13--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kantarcioglu, M., and Clifton, C., Privacy-preserving distributed mining of association rules on horizontally partitioned data. In IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9. 2004. 1026--1037. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Cramer, R. On the Complexity of Verifiable Secret Sharing and Multiparty Computation. In Proceedings of symposium on Theory of computing. 2000. 325--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Halpern, J., and Teague, V. Rational Secret Sharing and Multiparty Computation. In Proceedings of symposium on Theory of computing. 2004. 623--632. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Considine, Li, J., F., Kollios, G., and Byers, J. Approximate aggregation techniques for sensor databases. In Proceedings of ICDE. 2004. 449--460. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Shrivastava, N., Buragohain, C., Agrawal, D., and Suri, S. Medians and beyond: New aggregation techniques for sensor networks. In Proceedings of Conference on Embedded Networked Sensor Systems. 2004. 239--249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Yang, Y., Wang, X., Zhu, S., and Cao, G. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of MOBIHOC, 2006. 1--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Feng, T., Wang, C., Zhang, W. and Ruan, L. Confidentiality protection schemes for data aggregation in sensor networks. In Proceedings of INFOCOM. 2008. 56--60.Google ScholarGoogle Scholar
  29. Abdelzaher, T., Anokwa, Y., Boda, P., Burke, J., Estrin, E., Guibas, L., Kansal, A., Madden, S., and Reich, J. Mobiscopes for human spaces. In IEEE Pervasive Computing, vol. 6, no. 2. 2007. 20--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Hull, B., Bychkovsky, V., Zhang, Y., Chen, K., M., Goraczko, Miu, A. K., Shih, E., Balakrishnan, H., and Madden, S. CarTel: A Distributed Mobile Sensor Computing System. In Proceedings of SenSys, 2006. 125--138 Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '11: Proceedings of the 2011 ACM Symposium on Applied Computing
    March 2011
    1868 pages
    ISBN:9781450301138
    DOI:10.1145/1982185

    Copyright © 2011 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 21 March 2011

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%
  • Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader