An Improved Data Fusion Method IICKPAD for Privacy Protection in Wireless Sensor Networks
DOI: 10.23977/jnca.2017.21001 | Downloads: 26 | Views: 3763
Author(s)
Zhang Shaomin 1, Li Ran 1, Wang Baoyi 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China
Corresponding Author
Zhang ShaominABSTRACT
Aiming at the privacy and security of data acquisition and monitoring in wireless sensor networks, an improved data fusion method, IICKPDA, is proposed for privacy protection in wireless sensor networks. The method is based on the ICKPDA algorithm, which optimizes the deadline between the same layer and the different layers,which can be randomly selected by the adjacent nodes of the data fragments to be transmitted, and also the non-leaf nodes which only the data is not collected to improve the characteristics of the data. The improved algorithm avoids the redundancy of the intermediate fusion process and protects the collected monitoring data, which improves the data fusion precision and the fusion efficiency of the intermediate fusion node. Theory and related experiments demonstrate the feasibility of the method.
KEYWORDS
Wireless sensor networks, Data fusion, Privacy protection, IntegrityCITE THIS PAPER
Shaomin, Z., Ran, L., Baoyi, W. (2017) An Improved Data Fusion Method IICKPAD for Privacy Protection in Wireless Sensor Networks. Journal of Network Computing and Applications (2017) Vol.2, Num.1:1-6.
REFERENCES
[1] Culler D, Estrin D, Srivastava M. Guest editors' introduction: overview of sensor networks[J]. IEEE Computer 2004; 37(8): 41-49.
[2] Zhang L, Zhang H q Mauro Conti, et al. Preserving privacy against external and internal threats in WSN data aggregation}J}. Telecommunication Systems, 2013, 52(4): 2163-2176.
[3] Hu Wei, Zhao Wenhui. Data Fusion Approach for the Energy Internet Based on Time Window and the Adaptive Weights[J]. Journal of Systems Management, 2016,05: 907-913.
[4] Ozdemir S and Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview[J]. Computer Networks, 2009, 53(12): 2022-2037.
[5] Madden S, Franklin M J, and Hellerstein J M. TAG: a tiny aggregation service for Ad-hoc sensor net-works[C].Proceedings of the 5th Symposium on Operating SystemsDesign and Implementation, Boston, 2002: 131-146.
[6] Eschenauer L and Gligor V D. A key-management scheme for distributed sensor networks[C]. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, 2002: 41-47.
[7] Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of the 40th IEEE International Conference on Communications, Seoul, 2005: 3044-3049.
[8] Westhoff D, Girao J, and Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation[J].IEEE Transactions on Mobile Computing, 2006, 5(10):1417-1431.
[9] He W, Liu X, Nguyen H, et al.. PDA: privacy-preserving data aggregation in wireless sensor networks[C]. Proceedings of the 26th IEEE International Conference on Computer Communications(INFOCOM), Anchorage, 2007: 2045-2053.
[10] YANG Geng, WANG An-qi, CHEN Zheng-yu, et al. A Energy-Saving Privacy-Protection Data Algorithm[J]. Journal of Computers, 2011, 34 (5): 792-800.
[11] YANG Geng, LI Sen, CHEN Zhengyu, XU Jian, YANG Zhen.High. High-Accuracy and Privacy-Preserving Oriented Data Fusion Algorithm in Sensor Networks [J]. Journal of Computers, 2013,01: 189-200.
[12] He W,Nguyen H,Liu X, et al. iPDA: an integrity- protecting private data aggregation scheme for wireless sensor networks [C] //Military Communications Conference. San Diego, CA:[s. N.],2008: 1-7.
[13] Bista R, Yoo H K, and Chang J W. A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks[C]. Proceedings of the 10th IEEE International Conference on Computer and Information Technology,Bradford, 2010: 2463-2470.
[14] ZHAO Dan, YANG Geng. A Complex Field - based Integrity - protecting Data Aggregation Algorithm[J]. Journal of Computer Technology and Development, 2012, (08): 150-154 + 158.
[15] Zhou Qiang, Yang Geng, Li Sen, Chen Lei. An Integrity-checking Privacy Data Aggregation Algorithm[J]. Journal of Electronics & Information Technology, 2013, (06): 1277-1283.
Downloads: | 1157 |
---|---|
Visits: | 109968 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks