Skip to main content
Top
Published in: Cluster Computing 3/2019

22-09-2017

CSDA: a novel cluster-based secure data aggregation scheme for WSNs

Authors: Wei Fang, XueZhi Wen, Jiang Xu, JieZhong Zhu

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the development of wireless sensor networks, privacy-preserving has become a very important problem in numerous wireless sensor networks (WSN) applications. This paper presents a novel energy-efficient secure data aggregation scheme cluster-based private data aggregation (CSDA) based on cluster privacy-preserving. It has good flexibility and practical applicability using the slice-assemble technology. And, the number of fragments will dynamically change from the change of the network scale. Then, it can reduce communication overhead and energy consumption. Finally, the simulation results show that the proposed aggregation method demonstrates better performance in data aggregation precision, privacy-preserving and communication efficiency than other methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey [J]. Comput. Netw. 38(4), 393–422 (2002)CrossRef Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey [J]. Comput. Netw. 38(4), 393–422 (2002)CrossRef
2.
go back to reference Rajagopalan, R., Varshney, P.: Data-aggregation techniques in sensor networks: a survey [J]. IEEE Commun. Surv. Tutor. 8(4), 48–63 (2006)CrossRef Rajagopalan, R., Varshney, P.: Data-aggregation techniques in sensor networks: a survey [J]. IEEE Commun. Surv. Tutor. 8(4), 48–63 (2006)CrossRef
3.
go back to reference Jesus, P., Baquero, C., Almeida, P.: A survey of distributed data aggregation algorithms [J]. IEEE Commun. Surv. Tutor. 17(1), 381–404 (2015)CrossRef Jesus, P., Baquero, C., Almeida, P.: A survey of distributed data aggregation algorithms [J]. IEEE Commun. Surv. Tutor. 17(1), 381–404 (2015)CrossRef
4.
go back to reference Qayyum, B., Saeed, M., Roberts, J.: Data aggregation in wireless sensor networks with minimum delay and minimum use of energy: a comparative study [C]. In: Mobility, Intelligent Networks and Smart Societies, pp. 573–582 (2015) Qayyum, B., Saeed, M., Roberts, J.: Data aggregation in wireless sensor networks with minimum delay and minimum use of energy: a comparative study [C]. In: Mobility, Intelligent Networks and Smart Societies, pp. 573–582 (2015)
5.
go back to reference Randhawa, S., Jain, S.: Data aggregation in wireless sensor networks: previous research, current status and future directions [J]. Wirel. Pers. Commun. 4, 1–71 (2017) Randhawa, S., Jain, S.: Data aggregation in wireless sensor networks: previous research, current status and future directions [J]. Wirel. Pers. Commun. 4, 1–71 (2017)
6.
go back to reference Acharya, M., Girao, J., Westhoff, D.: Secure comparison of encrypted data in wireless sensor networks [C]. In: Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), Washington, DC, USA, pp. 47–53 (2005) Acharya, M., Girao, J., Westhoff, D.: Secure comparison of encrypted data in wireless sensor networks [C]. In: Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), Washington, DC, USA, pp. 47–53 (2005)
7.
go back to reference Armknecht, F., Westhoff, D., Girao, J., Hessler, A.: A lifetime-optimized end to-end encryption scheme for sensor networks allowing in-network processing [J]. Comput. Commun. 31(4), 734–749 (2008)CrossRef Armknecht, F., Westhoff, D., Girao, J., Hessler, A.: A lifetime-optimized end to-end encryption scheme for sensor networks allowing in-network processing [J]. Comput. Commun. 31(4), 734–749 (2008)CrossRef
8.
go back to reference He, W.B, Liu, X., Hoang, N., et al.: PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks [C]. In: IEEE INFOCOM’07, vol. 28, pp. 2045–2053. IEEE Press (2007) He, W.B, Liu, X., Hoang, N., et al.: PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks [C]. In: IEEE INFOCOM’07, vol. 28, pp. 2045–2053. IEEE Press (2007)
9.
go back to reference Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists [J]. In: EURASIP J. Inf. Sec. 2007(1), 1–10 (2007)CrossRef Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists [J]. In: EURASIP J. Inf. Sec. 2007(1), 1–10 (2007)CrossRef
10.
go back to reference Sen J., Maitra S.: An Attack on Privacy-Preserving Data Aggregation Protocol for Wireless Sensor Networks [C]. In: NordSec 2011 LNCS 7161, pp. 205–222 (2012) Sen J., Maitra S.: An Attack on Privacy-Preserving Data Aggregation Protocol for Wireless Sensor Networks [C]. In: NordSec 2011 LNCS 7161, pp. 205–222 (2012)
11.
go back to reference Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks [J]. Commun. ACM 47(6), 53–57 (2004)CrossRef Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks [J]. Commun. ACM 47(6), 53–57 (2004)CrossRef
12.
go back to reference Rajalakshmi, M.C., Gnana, P.A.P.: REEDA: routing with energy efficiency data aggregation in wireless sensor network [C]. In: International Conference on Emerging Research in Electronics, Computer Science and Technology. pp. 174–179. IEEE (2016) Rajalakshmi, M.C., Gnana, P.A.P.: REEDA: routing with energy efficiency data aggregation in wireless sensor network [C]. In: International Conference on Emerging Research in Electronics, Computer Science and Technology. pp. 174–179. IEEE (2016)
13.
go back to reference Alzaid, H., Foo, E., Nieto, J.M., Park, D.G.: A taxonomy of secure data aggregation in wireless sensor networks [J]. Int. J. Commun. Netw. Distrib. Syst. 8(1), 101–148 (2012)CrossRef Alzaid, H., Foo, E., Nieto, J.M., Park, D.G.: A taxonomy of secure data aggregation in wireless sensor networks [J]. Int. J. Commun. Netw. Distrib. Syst. 8(1), 101–148 (2012)CrossRef
14.
go back to reference Man, D., Wang, C., Yang, W., et al.: Energy-efficient cluster-based privacy data aggregation for wireless sensor networks [J]. J. Tsinghua Univ. 57(2), 213–219 (2017) Man, D., Wang, C., Yang, W., et al.: Energy-efficient cluster-based privacy data aggregation for wireless sensor networks [J]. J. Tsinghua Univ. 57(2), 213–219 (2017)
15.
go back to reference Yang, G., Wang, A.Q, Cheng, Z.Y, et al.: An energy-saving-preserving data aggregation algorithm [J]. Chin. J. Comput. 34(5), 792–799 (2011) Yang, G., Wang, A.Q, Cheng, Z.Y, et al.: An energy-saving-preserving data aggregation algorithm [J]. Chin. J. Comput. 34(5), 792–799 (2011)
16.
go back to reference Pateriya, R.K., Sharma, S.: The evolution of RFID security and privacy: a research survey [C]. In: 2011 International Conference on Communication Systems and Network Technologies IEEE, pp. 116–117 (2011) Pateriya, R.K., Sharma, S.: The evolution of RFID security and privacy: a research survey [C]. In: 2011 International Conference on Communication Systems and Network Technologies IEEE, pp. 116–117 (2011)
17.
go back to reference Carbunar, B., Yu, Y., Shi, L., et al.: Query privacy in wireless sensor networks [C]. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’07), pp. 203-212. IEEE Computer Society (2007) Carbunar, B., Yu, Y., Shi, L., et al.: Query privacy in wireless sensor networks [C]. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’07), pp. 203-212. IEEE Computer Society (2007)
18.
go back to reference Kur, J., Stetsko, A.: Location Privacy Issues in Wireless Sensor Networks [J]. The Future of Identity. In: IFIP AICT vol. 298, pp. 160–169 (2009) Kur, J., Stetsko, A.: Location Privacy Issues in Wireless Sensor Networks [J]. The Future of Identity. In: IFIP AICT vol. 298, pp. 160–169 (2009)
19.
go back to reference Chen, J., Zhang, H.L.: Survey on wireless sensor network security [J]. J. Harbin Inst. Technol. 43(7), 90–95 (2011) Chen, J., Zhang, H.L.: Survey on wireless sensor network security [J]. J. Harbin Inst. Technol. 43(7), 90–95 (2011)
20.
go back to reference He, W., Nguyen, H., Liu, X., Nahrstedt, K., AbdeIzaher, T.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks[C]. In: Proceedings of the Military Communications Conference, San Diego, CA, pp. 1–7 (2008) He, W., Nguyen, H., Liu, X., Nahrstedt, K., AbdeIzaher, T.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks[C]. In: Proceedings of the Military Communications Conference, San Diego, CA, pp. 1–7 (2008)
21.
go back to reference He, W., Liu, X., Nguyen, H., Nahrstedt, K.: A cluster-based protoc01 to enforce integrity and preserve privacy in data aggregation [C]. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 14–19. Montreal, QC (2009) He, W., Liu, X., Nguyen, H., Nahrstedt, K.: A cluster-based protoc01 to enforce integrity and preserve privacy in data aggregation [C]. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 14–19. Montreal, QC (2009)
22.
go back to reference Qu, Z.G., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.J.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks [J]. China Commun. 13(7), 108–116 (2016)CrossRef Qu, Z.G., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.J.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks [J]. China Commun. 13(7), 108–116 (2016)CrossRef
23.
go back to reference Zhang, Y., Sun, X., Baowei, W.: Efficient algorithm for k-barrier coverage based on integer linear programming [J]. China Commun. 13(7), 16–23 (2016)CrossRef Zhang, Y., Sun, X., Baowei, W.: Efficient algorithm for k-barrier coverage based on integer linear programming [J]. China Commun. 13(7), 16–23 (2016)CrossRef
24.
go back to reference Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks [C]. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, USA, pp. 41–47 (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks [C]. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, USA, pp. 41–47 (2002)
25.
go back to reference Jaydip, S., Subhamoy, M.: An attack on privacy-preserving data aggregation protocol [C]. Lect. Notes Comput. Sci. 7161, 205–222 (2012)CrossRef Jaydip, S., Subhamoy, M.: An attack on privacy-preserving data aggregation protocol [C]. Lect. Notes Comput. Sci. 7161, 205–222 (2012)CrossRef
Metadata
Title
CSDA: a novel cluster-based secure data aggregation scheme for WSNs
Authors
Wei Fang
XueZhi Wen
Jiang Xu
JieZhong Zhu
Publication date
22-09-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1195-7

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner