ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks

Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes w...

Full description

Bibliographic Details
Main Authors: Liehuang Zhu, Zhen Yang, Mingzhong Wang, Meng Li
Format: Article
Language:English
Published: SAGE Publishing 2013-05-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/241261
id doaj-46cf283a059b4f168394ba8b51783e25
record_format Article
spelling doaj-46cf283a059b4f168394ba8b51783e252020-11-25T03:34:12ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-05-01910.1155/2013/241261ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor NetworksLiehuang ZhuZhen YangMingzhong WangMeng LiWireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes with challenges for data confidentiality protection. Many existing confidentiality preserving aggregation protocols have to transfer list of sensors' ID for base station to explicitly tell which sensor nodes have actually provided measurement. However, forwarding a large number of node IDs brings overwhelming extra communication overhead. In this paper, we propose provably secure aggregation scheme perturbation-based efficient confidentiality preserving protocol (PEC2P) that allows efficient aggregation of perturbed data without transferring any ID information. In general, environmental data is confined to a certain range; hence, we utilize this feature and design an algorithm to help powerful base station retrieve the ID of reporting nodes. We analyze the accuracy of PEC2P and conclude that base station can retrieve the sum of environmental data with an overwhelming probability. We also prove that PEC2P is CPA secure by security reduction. Experiment results demonstrate that PEC2P significantly reduces node congestion (especially for the root node) during aggregation process in comparison with the existing protocols.https://doi.org/10.1155/2013/241261
collection DOAJ
language English
format Article
sources DOAJ
author Liehuang Zhu
Zhen Yang
Mingzhong Wang
Meng Li
spellingShingle Liehuang Zhu
Zhen Yang
Mingzhong Wang
Meng Li
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
International Journal of Distributed Sensor Networks
author_facet Liehuang Zhu
Zhen Yang
Mingzhong Wang
Meng Li
author_sort Liehuang Zhu
title ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_short ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_full ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_fullStr ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_full_unstemmed ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_sort id list forwarding free confidentiality preserving data aggregation for wireless sensor networks
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2013-05-01
description Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes with challenges for data confidentiality protection. Many existing confidentiality preserving aggregation protocols have to transfer list of sensors' ID for base station to explicitly tell which sensor nodes have actually provided measurement. However, forwarding a large number of node IDs brings overwhelming extra communication overhead. In this paper, we propose provably secure aggregation scheme perturbation-based efficient confidentiality preserving protocol (PEC2P) that allows efficient aggregation of perturbed data without transferring any ID information. In general, environmental data is confined to a certain range; hence, we utilize this feature and design an algorithm to help powerful base station retrieve the ID of reporting nodes. We analyze the accuracy of PEC2P and conclude that base station can retrieve the sum of environmental data with an overwhelming probability. We also prove that PEC2P is CPA secure by security reduction. Experiment results demonstrate that PEC2P significantly reduces node congestion (especially for the root node) during aggregation process in comparison with the existing protocols.
url https://doi.org/10.1155/2013/241261
work_keys_str_mv AT liehuangzhu idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
AT zhenyang idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
AT mingzhongwang idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
AT mengli idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
_version_ 1724559955405570048