2008 4th International Conference on Wireless Communications, Networking and Mobile Computing 2008
DOI: 10.1109/wicom.2008.951
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Classification Privacy Data Aggregation in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…DADPP The DADPP (Data Aggregation Different Privacy levels Protection) [19] provides different level of data aggregation privacy based on different node numbers for pretreating the data. The different level of privacy is achieved based on Shao et al [20] scheme and achieving privacy based on CPDA protocol.…”
Section: Srdamentioning
confidence: 99%
“…DADPP The DADPP (Data Aggregation Different Privacy levels Protection) [19] provides different level of data aggregation privacy based on different node numbers for pretreating the data. The different level of privacy is achieved based on Shao et al [20] scheme and achieving privacy based on CPDA protocol.…”
Section: Srdamentioning
confidence: 99%
“…DADPP: Data Aggregation Different Privacy-levels Protection (DADPP) [ 29 ] offers different levels of data aggregation privacy based on different node numbers for pre-treating the data. This protocol is inspired by the work of Shao et al [ 30 ] in terms of different levels of privacy as well as the CPDA in terms of the privacy achieving method.…”
Section: Classification Of Ppda Protocolsmentioning
confidence: 99%
“…SMC and privacy preservation are closely related, particularly when some processing or computation is required on the data records. Historically, the SMC problem was introduced by Yao (Yao, et al (2008)), where a solution to the so-called Yao's Millionaire problem was proposed. In general SMC problem deals with computing any (probabilistic) function on any input, in a distributed network where each participant holds one of the inputs, ensuring independence of the inputs, correctness of the computation, and that no more information is revealed to a participant in the computation than can be inferred from that participant's input and output.…”
Section: Wsn Privacymentioning
confidence: 99%
“…In this way, the contribution of the shadow values for each twin key will cancel out each other and the correct aggregated result is finally obtained. Data Aggregation Different Privacy-levels Protection (DADPP) (Yao, et al (2008))) offers different levels of data aggregation privacy based on different node numbers for pre-treating the data. This protocol is inspired by the work of Shao et al in terms of different levels of privacy as well as the CPDA in terms of the privacy achieving method (Shao et al (2007)).…”
Section: Fig 4 Smc Scheme Illustrationmentioning
confidence: 99%