2015
DOI: 10.1155/2015/104286
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks

Abstract: With the rapid development and widespread use of wearable wireless sensors, data aggregation technique becomes one of the most important research areas. However, the sensitive data collected by sensor nodes may be leaked at the intermediate aggregator nodes. So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. Data integrity is verified b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…As the networking domain of IoBNT is itself novel and has diverse system requirements. The security mechanisms and access control [220] methods for IoBNT must be lightweight and compatible with resource-constrained [221] IoBNT devices and nanonetwork.…”
Section: B Challenges In Security Of Iobntmentioning
confidence: 99%
“…As the networking domain of IoBNT is itself novel and has diverse system requirements. The security mechanisms and access control [220] methods for IoBNT must be lightweight and compatible with resource-constrained [221] IoBNT devices and nanonetwork.…”
Section: B Challenges In Security Of Iobntmentioning
confidence: 99%
“…Public key cryptography is computationally very expensive and that's why all of these techniques have very high computation cost. Among these techniques [16,18,21] use Public Key Cryptography (PKC) only for encryption of messages and thus has high computational cost while the remaining [17,19,20] use PKC for encrypting messages and also for digital signature and thus it possesses very high computation cost. The CC of each of these techniques can be viewed in Figs.…”
Section: Computational Costmentioning
confidence: 99%
“…Since sensor node life (SL) is inversely proportional to CC and CO while EC is directly proportional to CC and CO. [20] High Small Small High Yes High Zhang et al [21] High Small Small High Yes High Therefore Hayouni et al [5] have small SL and high energy consumption (EC). Finster and Baumgart [11] high SL and medium EC.…”
Section: Sensor Node Life and Energy Consumptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhang et al proposed a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure of tree and cluster for the wearable wireless sensors in [15]. In [16], Cao et al proposed a privacy-preserving and auditingsupporting outsourcing data storage scheme by using encryption and digital watermarking.…”
Section: Related Workmentioning
confidence: 99%