IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.237
|View full text |Cite
|
Sign up to set email alerts
|

PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks

Abstract: Abstract-Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy-preserving data aggregation schemes for additive aggregation functions. The first scheme -Cluster-based Private Data Aggregation (CPDA)-leverages clustering protocol and algebraic properties of polynomials. It has the advantage of incurring less communication overhead. The second scheme -Slice-Mix-AggRegaTe (SMART)-builds on slicing tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
316
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 339 publications
(318 citation statements)
references
References 28 publications
(28 reference statements)
2
316
0
Order By: Relevance
“…Nodes can act maliciously by trying to infer measurements from their neighbors or by manipulating the aggregated data. The idea is based on additive homomorphic encryption used in secret perturbation (Castelluccia et al 2005), and data splitting (He et al 2007). The scheme work as follows: when a node sn i receives a query, it generates a random key e K i and encodes its measurement D i using that key and sends it directly to the AS.…”
Section: Data Aggregationmentioning
confidence: 99%
“…Nodes can act maliciously by trying to infer measurements from their neighbors or by manipulating the aggregated data. The idea is based on additive homomorphic encryption used in secret perturbation (Castelluccia et al 2005), and data splitting (He et al 2007). The scheme work as follows: when a node sn i receives a query, it generates a random key e K i and encodes its measurement D i using that key and sends it directly to the AS.…”
Section: Data Aggregationmentioning
confidence: 99%
“…There have been several protocols introduced for preserving the confidentiality of aggregate results [18,19,10,[21][22][23]. This issue is orthogonal to our protocol and is not considered in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…In (He, et al (2007)), He et.al. propose schemes to achieve data aggregation while preserving privacy. The scheme they proposed, CPDA (Cluster-based Private Data Aggregation) performs privacy-preserving data aggregation in low communication overhead with high computational overhead.…”
Section: Fig 4 Smc Scheme Illustrationmentioning
confidence: 99%