ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes w...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2013-05-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2013/241261 |
id |
doaj-46cf283a059b4f168394ba8b51783e25 |
---|---|
record_format |
Article |
spelling |
doaj-46cf283a059b4f168394ba8b51783e252020-11-25T03:34:12ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-05-01910.1155/2013/241261ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor NetworksLiehuang ZhuZhen YangMingzhong WangMeng LiWireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes with challenges for data confidentiality protection. Many existing confidentiality preserving aggregation protocols have to transfer list of sensors' ID for base station to explicitly tell which sensor nodes have actually provided measurement. However, forwarding a large number of node IDs brings overwhelming extra communication overhead. In this paper, we propose provably secure aggregation scheme perturbation-based efficient confidentiality preserving protocol (PEC2P) that allows efficient aggregation of perturbed data without transferring any ID information. In general, environmental data is confined to a certain range; hence, we utilize this feature and design an algorithm to help powerful base station retrieve the ID of reporting nodes. We analyze the accuracy of PEC2P and conclude that base station can retrieve the sum of environmental data with an overwhelming probability. We also prove that PEC2P is CPA secure by security reduction. Experiment results demonstrate that PEC2P significantly reduces node congestion (especially for the root node) during aggregation process in comparison with the existing protocols.https://doi.org/10.1155/2013/241261 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Liehuang Zhu Zhen Yang Mingzhong Wang Meng Li |
spellingShingle |
Liehuang Zhu Zhen Yang Mingzhong Wang Meng Li ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks International Journal of Distributed Sensor Networks |
author_facet |
Liehuang Zhu Zhen Yang Mingzhong Wang Meng Li |
author_sort |
Liehuang Zhu |
title |
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks |
title_short |
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks |
title_full |
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks |
title_fullStr |
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks |
title_full_unstemmed |
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks |
title_sort |
id list forwarding free confidentiality preserving data aggregation for wireless sensor networks |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2013-05-01 |
description |
Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes with challenges for data confidentiality protection. Many existing confidentiality preserving aggregation protocols have to transfer list of sensors' ID for base station to explicitly tell which sensor nodes have actually provided measurement. However, forwarding a large number of node IDs brings overwhelming extra communication overhead. In this paper, we propose provably secure aggregation scheme perturbation-based efficient confidentiality preserving protocol (PEC2P) that allows efficient aggregation of perturbed data without transferring any ID information. In general, environmental data is confined to a certain range; hence, we utilize this feature and design an algorithm to help powerful base station retrieve the ID of reporting nodes. We analyze the accuracy of PEC2P and conclude that base station can retrieve the sum of environmental data with an overwhelming probability. We also prove that PEC2P is CPA secure by security reduction. Experiment results demonstrate that PEC2P significantly reduces node congestion (especially for the root node) during aggregation process in comparison with the existing protocols. |
url |
https://doi.org/10.1155/2013/241261 |
work_keys_str_mv |
AT liehuangzhu idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks AT zhenyang idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks AT mingzhongwang idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks AT mengli idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks |
_version_ |
1724559955405570048 |