Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks

In recent years, some research used classical and heavyweight encryption technology to realise data privacy and integrity protection in data aggregation of wireless sensor networks. The challenge is the balance between resource constraints and the complexity of the deployment. In this study, the authors proposed a lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks (LIPDA) which has lightweight, secure and easy operability to preserve data privacy and integrity during data aggregation in wireless sensor network. First, a distance-based formation scheme of network topology is presented to balance the energy consumption of cluster heads. Then, a structure of complex number, which composes from the private factor of the nodes and the original data, is composed. The complex number is encrypted by additive homomorphic encryption method, which can realise the data aggregation without any decryption. Also, the reliability of data is ensured by using integrity verification method based on the complex operation. The theoretical analysis and simulation results show that the proposed scheme LIPDA can meet the requirement of privacy protection. Moreover, compared with related work, LIPDA has lower calculation, less traffic, higher accuracy and verifiable completeness.

[1]  Yang Xiao,et al.  Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.

[2]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[3]  Juan Chen,et al.  A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding: A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding , 2010 .

[4]  Manisha R. Dhage,et al.  Survey on Secure Data Aggregation in Wireless Sensor Networks , 2015, 2015 International Conference on Computing Communication Control and Automation.

[5]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[6]  Luca Becchetti,et al.  Privacy-Preserving Environment Monitoring in Networks of Mobile Devices , 2011, Networking Workshops.

[7]  Hyunjo Lee,et al.  An Efficient Data Aggregation Scheme for Protecting the Integrity of Sensitive Data in Wireless Sensor Networks , 2014 .

[8]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Xiaohui Liang,et al.  HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..

[10]  Peng Hu Location Privacy Preservation in Wireless Sensor Networks , 2015 .

[11]  Zhong Chen,et al.  Efficient and multi-level privacy-preserving communication protocol for VANET , 2012, Comput. Electr. Eng..

[12]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[13]  W. Qianqian,et al.  A survey on the privacy-preserving data aggregation in wireless sensor networks , 2015, China Communications.

[14]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[15]  Rabindra Bista,et al.  Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks , 2012, IEICE Trans. Inf. Syst..

[16]  Hong Chen,et al.  Verifiable Privacy-Preserving Top- k Query Protocol in Two-tiered Sensor Networks: Verifiable Privacy-Preserving Top- k Query Protocol in Two-tiered Sensor Networks , 2012 .

[17]  Sushil Jajodia,et al.  Privacy-preserving robust data aggregation in wireless sensor networks , 2009, Secur. Commun. Networks.

[18]  Hong Chen,et al.  Data Privacy Preservation in Wireless Sensor Networks , 2012 .

[19]  Xue Liu,et al.  A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[20]  Chi-Yin Chow,et al.  A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[21]  Li Jianzhong and Gao Hong,et al.  Survey on Sensor Network Research , 2008 .

[22]  Chen Juan A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding , 2010 .

[23]  Jin Zhang,et al.  Construction of a Biosensor Based on a Combination of Cytochrome c, Graphene, and Gold Nanoparticles , 2018, Sensors.