ABSTRACT
An important topic addressed by the wireless sensor networks community over the last several years is the in-net work data aggregation. It is significant as well as a challenging issue to provide reliable data aggregation scheme while preserving data privacy. However, in WSNs, achieving ideal data accuracy is complicated due to collision, heavy network traffic, processing delays and/or several attacks. The problem of gathering accurate integrated data will be further intensified if the environment is adverse. Hence how to attain data privacy and perfect data accuracy are two major challenges for data aggregation in wireless sensor networks. To address this problem, we propose in this paper a new privacy preserving data aggregation scheme. We present REBIVE (REliaBle prIVate data aggregation scheme). In REBIVE the data accuracy maintenance and data privacy protection mechanisms work cooperatively. Different from past research, our proposed solution have the following features: providing privacy preservation technique for individual sensor data and aggregated sensor data; maintaining perfect data accuracy for realistic environments; being highly efficient; and being robust to popular attacks launched in WSNs.
- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. A survey on sensor networks. In IEEE Communications Magazine, Vol. 40, Ed. 8. 2002. 102--114 Google Scholar
Digital Library
- Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor networks. In proceedings of the conference on Embedded networked sensor systems (SenSys). ACM Press. 2003. 255--265. Google Scholar
Digital Library
- Madden, S., Franklin, M. J., and Hellerstein, J. M. TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks. In Proceedings of the symposium on Operating systems design and implementation. ACM Press. 2002. 131--146. Google Scholar
Digital Library
- He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. PDA: Privacy-preserving Data Aggregation in Wire less Sensor Networks. In Proceedings of INFOCOM. 2007. 2045--2053.Google Scholar
- Zhang, W., Wang, C., and Feng, T. GP2S: generic privacy preservation solutions for approximate aggregation of sensor data. In Proceedings of Conference on Pervasive Computing and Communications. 2008. 179--184. Google Scholar
Digital Library
- He, W. and Liu, X. and Nguyen, H. and Nahrstedt, K. A Cluster-Based Protocol to Enforce Integrity and Pre serve Privacy in Data Aggregation. In Proceedings of the Conference on Distributed Computing Systems Workshops. IEEE Computer Society. 2009. 14--19. Google Scholar
Digital Library
- He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks. In Proceeding of MILCOM. IEEE Computer Society. 2008. 1--7.Google Scholar
- Castelluccia, C., Mykletun, E., and Tsudik, G. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. Proceeding of Mobiquitous. 2005. 109--117. Google Scholar
Digital Library
- Eschenauer, L., and Gligor, V. D. A key-management scheme for distributed sensor networks. In Proceedings of Conference on Computer and Communications Security. ACM Press. 2002. 41--47. Google Scholar
Digital Library
- Shamir, A. How to share a secret. In Communication of. ACM vol. 22, no. 11. ACM Press. 1979. 612--613. http://dx.doi.org/10.1145/359168.359176 Google Scholar
Digital Library
- Intanagonwiwat, Estrin, C., D., Govindan, R. and Heidemann, J. Impact of Network Density on Data Aggregation in Wireless Sensor Networks. In Proceedings of Conference on Distributed Computing Systems, 2002. 457. Google Scholar
Digital Library
- Deshpande, A., Nath, S. P., Gibbons, B., and Seshan, S. Cache-and-query for wide area sensor databases. In Proceedings of SIGMOD. 2003. 503--514. Google Scholar
Digital Library
- Solis, I., and Obraczka, K. The impact of timing in data aggregation for sensor networks. In Proceedings of ICC. 2004. 3640--3645.Google Scholar
- Abdelzaher, T., He, T., and Stankovic, J. Feedback Control of Data Aggregation in Sensor Networks. In Proceedings Conference on Decision and Control. 2004. 1490--1495.Google Scholar
Cross Ref
- Chen, J. Y., Pandurangan, G. and Xu, D. Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis. In Proceedings of IPSN. 2005. 348--355. Google Scholar
Digital Library
- Tang, X., and Xu, J. Extending network lifetime for precision constrained data aggregation in wireless sensor networks. In Proceedings of INFOCOM, 2006. 1--12.Google Scholar
Cross Ref
- Itanagonwiwat, C., Govindan, R., and Estrin, D. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proc. of MobiCom. 2002. 56--67. Google Scholar
Digital Library
- Agrawal, R. and Srikant, R. Privacy preserving data mining. In Proceedings of SIGMOD Conference Management of Data. 2000. 439--450. Google Scholar
Digital Library
- Kargupta, H., Datta, Q. W. S., and Sivakumar, K. On The Privacy Preserving Properties of Random Data Perturbation Techniques. In Proceedings of the Conference on Data Mining. 2003. 99--106. Google Scholar
Digital Library
- Huang, Z., Du, W., and Chen, B., Deriving Private Information from Randomized Data. In Proceedings of the ACM SIGMOD Conference. 2005. 37--48. Google Scholar
Digital Library
- Du, W., and Atallah, M. J. Secure multi-party computation problems and their applications: A review and open problems. In Proceedings of the Workshop on New Security Paradigms. 2001. 13--22. Google Scholar
Digital Library
- Kantarcioglu, M., and Clifton, C., Privacy-preserving distributed mining of association rules on horizontally partitioned data. In IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9. 2004. 1026--1037. Google Scholar
Digital Library
- Cramer, R. On the Complexity of Verifiable Secret Sharing and Multiparty Computation. In Proceedings of symposium on Theory of computing. 2000. 325--334. Google Scholar
Digital Library
- Halpern, J., and Teague, V. Rational Secret Sharing and Multiparty Computation. In Proceedings of symposium on Theory of computing. 2004. 623--632. Google Scholar
Digital Library
- Considine, Li, J., F., Kollios, G., and Byers, J. Approximate aggregation techniques for sensor databases. In Proceedings of ICDE. 2004. 449--460. Google Scholar
Digital Library
- Shrivastava, N., Buragohain, C., Agrawal, D., and Suri, S. Medians and beyond: New aggregation techniques for sensor networks. In Proceedings of Conference on Embedded Networked Sensor Systems. 2004. 239--249. Google Scholar
Digital Library
- Yang, Y., Wang, X., Zhu, S., and Cao, G. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of MOBIHOC, 2006. 1--43. Google Scholar
Digital Library
- Feng, T., Wang, C., Zhang, W. and Ruan, L. Confidentiality protection schemes for data aggregation in sensor networks. In Proceedings of INFOCOM. 2008. 56--60.Google Scholar
- Abdelzaher, T., Anokwa, Y., Boda, P., Burke, J., Estrin, E., Guibas, L., Kansal, A., Madden, S., and Reich, J. Mobiscopes for human spaces. In IEEE Pervasive Computing, vol. 6, no. 2. 2007. 20--29. Google Scholar
Digital Library
- Hull, B., Bychkovsky, V., Zhang, Y., Chen, K., M., Goraczko, Miu, A. K., Shih, E., Balakrishnan, H., and Madden, S. CarTel: A Distributed Mobile Sensor Computing System. In Proceedings of SenSys, 2006. 125--138 Google Scholar
Digital Library
Recommendations
Preserving privacy in wireless sensor networks using reliable data aggregation
An important topic addressed by the wireless sensor networks community over the last several years is the in-network data aggregation. It is significant as well as a challenging issue to provide reliable data aggregation scheme while preserving data ...
PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks
In wireless sensor networks, data aggregation protocols are used to prolong the network lifetime. However, the problem of how to perform data aggregation while preserving data privacy is challenging. This paper presents a polynomial regression-based ...
An attack on privacy preserving data aggregation protocol for wireless sensor networks
NordSec'11: Proceedings of the 16th Nordic conference on Information Security Technology for ApplicationsIn-network data aggregation in Wireless Sensor Networks (WSNs) provides efficient bandwidth utilization and energy-efficient computing. Supporting efficient in-network data aggregation while preserving the privacy of the data of individual sensor nodes ...





Comments