A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs

Data aggregation is a fundamental and efficient algorithm to reduce the communication overhead and energy consumption in wireless sensor networks (WSNs). However, WSNs need both energy-efficient and privacy-preserving when being deployed in an unprotected area. In this paper, we propose an energy-efficient and privacy-preserving data aggregation algorithm CBDA (the chain-based data aggregation). In the CBDA, sensor nodes will be organized as a tree topology. The leaf nodes of the tree sequentially reconnect with each other to form many chain topologies. For assuring data privacy, after data gathering, <xref rid="deqn1-2" ref-type="disp-formula">(1)</xref> the tail nodes (the nodes which on the tail of chain) need to slice their sensing data into <inline-formula> <tex-math notation="LaTeX">$J$ </tex-math></inline-formula> fragments. One fragment is kept by themselves, and they distribute the <inline-formula> <tex-math notation="LaTeX">$J-1$ </tex-math></inline-formula> data fragments to their neighbor nodes. <xref rid="deqn1-2" ref-type="disp-formula">(2)</xref> Each tail node will inject some fake fragments into its <inline-formula> <tex-math notation="LaTeX">$J-1$ </tex-math></inline-formula> fragments to interfere with adversaries. The CBDA can achieve less energy consumption and higher aggregation accuracy during data aggregation. We perform a comprehensive simulation to make a comparison among the CBDA with existing algorithms. The experimental results demonstrate that the CBDA outperforms the existing algorithms.

[1]  Yonglong Luo,et al.  Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[2]  Jörg Sander,et al.  A framework for spatio-temporal query processing over wireless sensor networks , 2004, DMSN '04.

[3]  Jaydip Sen,et al.  An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks , 2011, NordSec.

[4]  Yun Liu,et al.  ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.

[5]  Claude Castelluccia,et al.  DREAM: DiffeRentially privatE smArt Metering , 2012, ArXiv.

[6]  Sheng Zhong,et al.  Efficient and Privacy-Preserving Min and $k$ th Min Computations in Mobile Sensing Systems , 2017, IEEE Transactions on Dependable and Secure Computing.

[7]  Hai Jin,et al.  Communication-Efficient and Privacy-Preserving Data Aggregation without Trusted Authority , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[8]  Hyungbo Shim,et al.  Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption , 2018, IEEE Access.

[9]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[10]  Aldar C.-F. Chan,et al.  Concealed Data Aggregation for Wireless Sensor Networks , 2009 .

[11]  Siu-Ming Yiu,et al.  PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid , 2015, IEEE Transactions on Dependable and Secure Computing.

[12]  Ghasem Farjamnia,et al.  Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks , 2019, Wireless Personal Communications.

[13]  D. Sivakumar,et al.  Secure cluster-based data aggregation in wireless sensor networks with aid of ECC , 2019, Int. J. Bus. Inf. Syst..

[14]  Jiguo Yu,et al.  Energy-efficient adaptive slice-based secure data aggregation scheme in WSN , 2017, IIKI.

[15]  Hai-Jin Ding,et al.  Enhancing the Security of Multi-agent Networked Control Systems Using QKD based Homomorphic Encryption , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[16]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[17]  N. K. Prema,et al.  Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE) , 2018, Mobile Networks and Applications.

[18]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[19]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[20]  Qi Xie A new authenticated key agreement for session initiation protocol , 2012, Int. J. Commun. Syst..

[21]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[22]  Abdul Razaque,et al.  Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[23]  Hamid Haj Seyyed Javadi,et al.  Key-management scheme for wireless sensor networks based on merging blocks of symmetric design , 2018, Wirel. Networks.

[24]  C. Sreedhar,et al.  Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2013 .

[25]  Hassan N. Noura,et al.  Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks , 2019, Ann. des Télécommunications.

[26]  Ping Zhang,et al.  Multi-functional secure data aggregation schemes for WSNs , 2018, Ad Hoc Networks.

[27]  Chao Li,et al.  A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[28]  Hui Wu,et al.  Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs , 2019, ACM Trans. Sens. Networks.