Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2009
DOI: 10.1002/sec.95
|View full text |Cite
|
Sign up to set email alerts
|

Privacy‐preserving robust data aggregation in wireless sensor networks

Abstract: In-network data aggregation in wireless sensor networks (WSNs) is a technique aimed at reducing the communication overhead-sensed data are combined into partial results at intermediate nodes during message routing. However, in the above technique, some sensor nodes need to send their individual sensed values to an aggregator node, empowered with the capability to decrypt the received data to perform a partial aggregation. This scenario raises privacy concerns in applications like personal health care and the m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 56 publications
(49 citation statements)
references
References 27 publications
(27 reference statements)
0
49
0
Order By: Relevance
“…Data aggregation is necessary for wireless sensor networks. Based on the management pattern of cluster structure, in [1], Conti et al proposed a privacy-preserving algorithm for data fusion. In particular, neither the base station (BS) nor other nodes are able to compromise the privacy of an individual node's sensed value.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Data aggregation is necessary for wireless sensor networks. Based on the management pattern of cluster structure, in [1], Conti et al proposed a privacy-preserving algorithm for data fusion. In particular, neither the base station (BS) nor other nodes are able to compromise the privacy of an individual node's sensed value.…”
Section: Related Workmentioning
confidence: 99%
“…Many of the existing researches have increased the privacy protection function on the basis of data fusion. For instance, in [1], Conti et al design a private data aggregation protocol that does not leak individual sensed values during the data aggregation process. It enhances the robustness, and the node computing complexity and data transmission are not large.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the sink node sends the aggregated data to the service client (lines 12∼15). If (the node is InternalNode){ (6) StoresencDatafrom msg; (7) decryptedData = decryption(encData)' (8) aggregatedData += decryptedData; (9) newEncData = HilbertCurve(direction, curveLevel, aggregatedData); (10) If (all data is received from childNode) (11) SendMessage(encData);to ParentNode; (12) }If (a node is SinkNode) (13) StoreencData from msg; (14) decryptedData = decryption(encData); (15) Send Message(decryptedData) to User;}} End Algorithm Algorithm 3: Data aggregation algorithm. …”
Section: Data Transmission Phasementioning
confidence: 99%
“…The sensor nodes of the above algorithm are subject to serious losses and susceptible to environmental impacts during service. The new research worked on data aggregation based on route algorithm (Wei and Yang, 2013;Lee, Kim and Chang, 2014), but few took data security into account (Conti et al, 2009). During the calculation process, frequent encryption and decryption operations increase the overall operation time (Zhou, Yang and He, 2014;Yang et al, 2008).…”
Section: Introductionmentioning
confidence: 99%