Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey

Full Text (PDF, 414KB), PP.66-74

Views: 0 Downloads: 0

Author(s)

Joyce Jose 1,* M. Princy 1 Josna Jose 1

1. Dept. Information Technology, Karunya University, Coimbatore, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.07.08

Received: 3 Dec. 2012 / Revised: 7 Mar. 2013 / Accepted: 22 Apr. 2013 / Published: 8 Jun. 2013

Index Terms

Wireless Sensor Networks, data privacy, data integrity, energy efficiency, data aggregation

Abstract

The data aggregation is a widely used energy-efficient mechanism in wireless sensor Networks (WSNs), by avoiding the redundant data transmitting to base station. The deployment of wireless communicating sensor nodes in the hostile or unattended environment causes attack more easily and the resource limited characteristics make the conventional security algorithms infeasible, hence protecting privacy and integrity during data aggregation is a challenging task. The privacy of a sensor data ensures, it is known only to itself and the integrity guarantees sensor data has not tampered during data aggregation. The Integrity Protecting Privacy preserving Data Aggregation (IPPDA) protocols ensures a robust and accurate results at the base station. This paper summarises on such IPPDA protocols during data aggregation.

Cite This Paper

Joyce Jose, M. Princy, Josna Jose, "Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.7, pp.66-74, 2013. DOI:10.5815/ijcnis.2013.07.08

Reference

[1]Vaibhav Pandey, Amarjeet, Narottam Chand, A review on data aggregation techniques in wireless sensor network, Journal of Electronics & Electrical Engineering, ISSN: 0976-8106 & E-ISSN: 0976-8114, Vol.1, Issue 2, 2010, pp-01-08.
[2]Nadini.S.Patil, Prof. P. R. Patil, Data Aggregation in wireless sensor network, IEEE International Conference on Computational Intelligence and Computing Research, 2010, ISBN 97881 8371 3627.
[3]K. Akkaya and I. Ari. In-network Data Aggregation in Wireless Sensor Networks, Handbook of Computer Networks, Ed. H. Bidgoli, John Wiley & Sons, Vol. 2, pp. 1131-1146, 2008.
[4]Agrawal, R; Srikant, R, Privacy-preserving data mining, In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, May 15–18, 2000; pp. 439–450.
[5]Kargupta, H.; Datta, Q.W.S.; Sivakumar, K, On the privacy preserving properties of random data perturbation techniques, In Proceedings of the IEEE International Conference on Data Mining, Melbourne, FL, USA, November 19–22, 2003; pp. 99–106.
[6]Rabindra Bista, Hye-Kyeom Yoo, Jae-Woo Chang, A New Sensitive Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks, proceedings of the 10th IEEE International Conference on Computer and Information Technology (CIT 2010).
[7]W.He, X. Liu, H. Nguyen, K. Nahrstedt, T. Abdelzaher, iPDA : An Integrity –Protecting Private Data Aggregation Scheme for Wireless Sensor Networks, IEEE MILCOM, November 2008, pp 1-7.
[8]Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, "A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation", Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW '09), 2009 pp 14-19.
[9]He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T, PDA: Privacy-preserving data aggregation in wireless sensor networks. Proceedings of 26th IEEE International Conference on Computer Communications (Infocom 2007), Anchorage, Alaska, USA, May 2007:2045-2053.
[10]O. Goldreich, Secure multi-party computation, Working Draft, Version 1.3, 2011.
[11]Chien -Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Min Sun, RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARRALLEL AND DISTRIBUTED SYSTEMS, VOL 23, NO 4, APRIL 2012.
[12]Xiaodong Lin, Rongxing Lu, Xuemin (Sherman) Shen, MPDA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks, Wireless Communications and Mobile Computing, 2010; 10:843-856.
[13]Lin X, Lu R, Shen X, Nemoto Y, Kato N, SAGE: a strong privacy preserving scheme against global eavesdropping for e-health systems, IEEE Journal of Selected Areas of Communications (in press).
[14]Sheng, B.; Li, Q. Verifiable privacy-preserving range query in two-tiered sensor networks. In Proceedings of the 27th IEEE International Conference on Computer Communications, INFOCOM, Phoenix, AZ, USA, April 15–17, 2008; pp. 457–465.
[15]Hacigumus, H.; Iyer, B.R.; Li, C.; Mehrotra, S. Executing SQL over encrypted data in the database service provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, WI, USA, June 3–6, 2002; pp. 216–227.
[16]Hore, B.; Mehrotra, S.; Tsudik, G. A privacy-preserving index for range queries. In Proceeding of the 28th Very Large Database Conference, VLDB, Toronto, Canada, August 29–September 3, 2004; pp. 720–731.
[17]Taban, G.; Gligor, V.D. Privacy-preserving integrity-assured data aggregation in sensor networks. In Proceeding of International Symposium on Secure Computing, SecureCom, Vancouver, Canada, August 29–31, 2009; pp. 168–175.
[18]Bellare, M.; Canetti, R.; Krawczyk, H. Keying hash functions for message authentication. In Proceedings of Annual International Cryptology Conference, Crypto, Santa Barbara, CA, USA, August 18–22, 1996; pp. 1–16.
[19]Agrawal, R.; Kiernan, J.; Srikant, R.; Xu, Y. Order preserving encryption for numeric data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, June 13–18, 2004, pp. 563–574.
[20]Chan, H.; Perrig, A.; Song, D. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October 30–November 3, 2006; pp. 278–287.
[21]Hung-Min Sun, Chien-Ming Chen, Yue-Hsun Lin, and Ya-Ching Lin, Supplementary Material: "Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks", SUPPLEMENTAL MATERIAL FOR THE IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, available on http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.29.