2021
DOI: 10.1007/s12652-020-02801-6
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient privacy-preserving data aggregation algorithm

Abstract: As a significant part of the Internet of things, wireless sensor networks (WSNs) is frequently implemented in our daily life. Data aggregation in WSNs can realize limited transmission and save energy. In the process of data aggregation, node data information is vulnerable to be eavesdropped and attacked. Therefore, it is of great significance to the research of data aggregation privacy protection in WSNs. We propose a secure and efficient privacy-preserving data aggregation algorithm (SECPDA) based on the orig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…In this method, they have sliced the data and encrypted using the advanced encryption standard (AES) encryption to secure the communication between the sensor device and the IoT devices. In the paper, Dou et al [18], they have proposed an algorithm, secure and efficient privacy-preserving data aggregation algorithm (SECPDA), which provides privacy to the clustered data aggregation data. This algorithm selects the cluster head nodes and uses various slicing methods to provide privacy on the aggregated data.…”
Section: Figure 1 Data Aggregation In Wsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this method, they have sliced the data and encrypted using the advanced encryption standard (AES) encryption to secure the communication between the sensor device and the IoT devices. In the paper, Dou et al [18], they have proposed an algorithm, secure and efficient privacy-preserving data aggregation algorithm (SECPDA), which provides privacy to the clustered data aggregation data. This algorithm selects the cluster head nodes and uses various slicing methods to provide privacy on the aggregated data.…”
Section: Figure 1 Data Aggregation In Wsnsmentioning
confidence: 99%
“…after the selection of the cluster, the head has been evaluated, if any of the IoT devices don't have any trust value, then the probability of the IoT device is evaluated as (18):…”
Section: Secure Metric For Classifying Malicious Sensor Nodesmentioning
confidence: 99%
“…Authors (Dou et al, 2021) have proposed a data aggregation privacy security method in wireless sensor networks (WSN). The proposed solution is a stable and efficient based on the secure and efficient privacy‐preserving data aggregation method which makes use of SEP protocol to choose the cluster head nodes in a dynamic manner.…”
Section: Related Workmentioning
confidence: 99%
“…Langari et al 26 proposed a combined anonymity algorithm based on k -means clustering to minimize information loss and protect user privacy in social networks. Dou et al 27 proposed a privacy protection data aggregation algorithm based on primitive clustering, which can effectively reduce data traffic and improve data privacy. Song et al 28 introduced a hierarchical clustering method based on a sensitivity level division algorithm, and proposed a sensitive k -anonymity model, which can effectively protect data privacy and improve data security and practicability.…”
Section: Related Workmentioning
confidence: 99%