浏览全部资源
扫码关注微信
1. 中国人民大学信息学院,北京 100872
2. 中国人民大学数据工程与知识工程教育部重点实验室,北京 100872
3. 工业和信息化部电子第五研究所,广东 广州 510000
[ "张晓莹(1987-),女,山东临沂人,博士,中国人民大学工程师,主要研究方向为物联网数据管理、隐私保护等。" ]
[ "彭辉(1986-),男,山东曲阜人,博士,工业和信息化部电子第五研究所工程师,主要研究方向为物联网数据管理、隐私保护等。" ]
[ "陈红(1965-),女,江西鄱阳人,博士,中国人民大学教授、博士生导师,主要研究方向为数据库、数据仓库、物联网等。" ]
网络出版日期:2018-10,
纸质出版日期:2018-10-25
移动端阅览
张晓莹, 彭辉, 陈红. 无线传感器网络隐私保护数据聚集技术[J]. 通信学报, 2018,39(10):130-142.
Xiaoying ZHANG, Hui PENG, Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks[J]. Journal on communications, 2018, 39(10): 130-142.
张晓莹, 彭辉, 陈红. 无线传感器网络隐私保护数据聚集技术[J]. 通信学报, 2018,39(10):130-142. DOI: 10.11959/j.issn.1000-436x.2018101.
Xiaoying ZHANG, Hui PENG, Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks[J]. Journal on communications, 2018, 39(10): 130-142. DOI: 10.11959/j.issn.1000-436x.2018101.
对无线传感器网络隐私保护数据聚集技术的研究现状与进展进行了综述。首先介绍研究相关的基础知识,包括网络模型、攻击模型和性能评估指标;然后按照同态加密、数据扰动、切分重组、泛化、安全多方计算等隐私保护技术对现有研究成果进行分类,详细阐述了具有代表性的协议的核心技术,对比分析了的各协议的性能;最后,对未来研究方向进行了展望。
A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly
preliminaries were introduced
including network models
adversary models
and performance evaluation metrics.Secondly
existing related work was classified into several types according to privacy preservation techniques
such as homomorphic encryption
data perturbation
slicing-mixing technique
generalization
secure multiparty computation
and the key mechanisms of typical protocols were elaborated and analyzed.Finally
the promising future research directions were discussed.
AKYILDIZ I F , SU W , SANKARASUBRAMANIAM Y , et al . Wireless sensor networks:a survey [J ] . Computer Networks , 2002 , 38 ( 4 ): 393 - 422 .
SAMUEL M , FRANKLIN M J , HELLERSTEIN J M , et al . TAG:A tiny aggregation service for ad-hoc sensor networks [J ] . OSDI , 2002 , 36 ( SI ): 131 - 146 .
GIRÃO J , WESTHOFF D , SCHNEIDER M . CDA:Concealed data aggregation for reverse multicast traffic in wireless sensor networks [J ] . ICC , 2005 3044 - 3049 .
GOLDREICH O . Foundations of cryptography:a primer [M ] . Boston : Now Publishers IncPress , 2005 .
SHENG B , LI Q . Verifiable privacy-preserving range query in two-tiered sensor networks [J ] . INFOCOM , 2008 46 - 50 .
SZEWCZYK R , FERENCZ A . Energy implication of network sensor designs [EB ] . 2016 .
RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms [J ] . Foundations of secure computation , 1978 , 4 ( 11 ): 169 - 180 .
WESTHOFF D , GIRÃO J , ACHARYA M . Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation [J ] . IEEE Trans.Mob.Comput , 2006 , 5 ( 10 ): 1417 - 1431 .
DOMINGO-FERRER J , . A provably secure additive and multiplicative privacy homomorphism [C ] // ISC . 2002 : 471 - 483 .
SICARI S , GRIECO L A , BOGGIA G , et al . DyDAP:a dynamic data aggregation scheme for privacy aware wireless sensor networks [J ] . Journal of Systems and Software , 2012 , 85 ( 1 ): 152 - 166 .
MASTROCRISTINO T , TESORIERE G , GRIECO L A , et al . Congestion control based on data-aggregation for wireless sensor networks [C ] // International Symposium on Industrial Electronics . 2010 : 3386 - 3391 .
CASTELLUCCIA C , MYKLETUN E , TSUDIK G , et al . Efficient aggregation of encrypted data in wireless sensor networks [C ] // MobiQuitous . 2005 : 109 - 117 .
VERNAM G S . Cipher printing telegraph systems for secret wire and radio telegraphic communications [J ] . Transactions of the American In stitute of Electrical Engineers , 1926 , 45 ( 2 ): 295 - 301 .
CRISTOFARO E D , . A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks [C ] // WOWMOM . 2007 : 1 - 5 .
CHAN H , PERRIG A , SONG D . Secure hierarchical in-network aggregation in sensor networks [C ] . ACM Conference on Computer and Communications Security , 2006 : 278 - 287 .
CASTELLUCCIA C , CHAN A , MYKLETUN E , et al . Efficient and provably secure aggregation of encrypted data in wireless sensor networks [J ] . TOSN , 2009 , 5 ( 3 ):20: 1 - 20 .
PRZYDATEK B , SONG D , PERRIG A . SIA:secure information aggregation in sensor networks [C ] // SenSys . 2003 : 255 - 265 .
CHAN H , PERRIG A , PRZYDATEK B , et al . SIA:secure information aggregation in sensor networks [J ] . Journal of Computer Security , 2007 , 15 ( 1 ): 69 - 102 .
YANG Y , WANG X , ZHU S , et al . SDAP:A secure hop-by-hop data aggregation protocol for sensor networks [J ] . ACM Trans.Inf.Syst.Secur. , 2008 , 11 ( 4 ): 18:1 - 18:43 .
ISKANDER M K , LEE A J . Privacy and robustness for data aggregation in wireless sensor networks [C ] // ACM Conference on Computer and Communications Security . 2010 : 699 - 701 .
GOBRIEL S , KHATTAB S , MOSSÉ D . et al . RideSharing:fault tolerant aggregation in sensor networks using corrective actions [C ] // SECON . 2006 : 595 - 604 .
OZDEMIR S , XIAO Y . Integrity protecting hierarchical concealed data aggregation for wireless sensor networks [J ] . Computer Networks , 2011 , 55 ( 8 ): 1735 - 1746 .
DAN B , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts [C ] // TCC . 2005 : 325 - 341 .
PAPADOPOULOS S , KIAYIAS A , PAPADIAS D . Secure and efficient in-network processing of exact SUM queries [C ] // ICDE . 2011 : 517 - 528 .
MENEZES A J , OORSCHOT P V , VANSTONE S A . Handbook of applied cryptography [M ] . Florida : CRC PressPress , 1996 .
PERRIG A , SZEWCZYK R , WEN V , et al . SPINS:Security Protocols for Sensor Networks [J ] . Wireless Networks , 2002 , 8 ( 5 ): 521 - 534 .
KUMAR V , MADRIA S K . Secure hierarchical data aggregation in wireless sensor networks:performance evaluation and analysis [C ] // MDM . 2012 : 196 - 201 .
MYKLETUN E , GIRÃO J , WESTHOFF D . Public key based crypto schemes for data concealment in wireless sensor networks [C ] // ICC . 2006 : 2288 - 2295 .
SUN H M , LIN Y H , HSIAO Y C , et al . An efficient and verifiable concealed data aggregation scheme in wireless sensor networks [C ] // ICESS . 2008 : 19 - 26 .
ZHOU Q , YANG G , HE L . An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks [J ] . IJDSN , 2014 ( 7 ): 962 - 925 .
CHAN C F , . Symmetric-key homomorphic encryption for encrypted data processing [C ] // ICC . 2009 : 1 - 5 .
AGRAWAL S , DAN B . Homomorphic MACs:MAC-based integrity for network coding [C ] // ACNS , 2009 : 292 - 305 .
MERAD B O R , SENOUCI S M , FEHAM M . Secure and efficient verification for data aggregation in wireless sensor networks [J ] . Journal of Network Management , 2018 ( 28 ).:e2000
SHIM K A , PARK C M . A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks [J ] . IEEE Trans.Parallel Distrib.Syst , 2015 , 26 ( 8 ): 2128 - 2139 .
ARA A , AL-RODHAAN M , YUAN T , et al . A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems [J ] . IEEE Access , 2017 ( 5 ): 12601 - 12617 .
ZHU H , GAO L , LI H . Secure and privacy-preserving body sensor data collection and query scheme [J ] . Sensors , 2016 , 16 ( 2 ):179.
XIE K , NING X , WANG X , et al . An efficient privacy-preserving compressive data gathering scheme in WSNs [J ] . Inf.Sci . 2017 ( 390 ): 82 - 94 .
TONYALI S , AKKAYA K , SAPUTRO N , et al . Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems [J ] . Future Generation Comp.Syst , 2018 ( 78 ): 547 - 557 .
ZHANG L , WANG X , LU J , et al . An efficient privacy preserving data aggregation approach for mobile sensing [J ] . Security and Communication , 2016 , 9 ( 16 ): 3844 - 3853
CHEN C M , LIN Y H , LIN Y C , et al . RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks [J ] . IEEE Trans.Parallel Distrib.Syst. , 2012 , 23 ( 4 ): 727 - 734 .
ZHANG K , HAN Q , CAI Z , et al . RiPPAS:a ring-based privacy-preserving aggregation scheme in wireless sensor networks [J ] . Sensors , 2017 , 17 ( 2 ):300.
ZHONG H , SHAO L , CUI J , et al . An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks [J ] . J.Parallel Distrib.Comput , 2018 ( 111 ): 1 - 12 .
ZHANG P , WANG J , GUO K , et al . Multi-functional secure data aggregation schemes for WSNs [J ] . Ad Hoc Networks , 2018 ( 69 ): 86 - 99 .
ADAM N R , WORTMANN J C . Security-control methods for statistical databases:a comparative study [C ] // ACM Comput.Surv . 1989 , 21 ( 4 ): 515 - 556 .
XIAO X , TAO Y , CHEN M . Optimal Random perturbation at multiple privacy levels [J ] . PVLDB , 2009 , 2 ( 1 ): 814 - 825 .
HE W , LIU X , NGUYEN H , et al . PDA:privacy-preserving data aggregation in wireless sensor networks [C ] // INFOCOM . 2007 : 2045 - 2053 .
HE W , LIU X , NGUYEN H , et al . PDA:privacy-preserving data aggregation for information collection [J ] . TOSN , 2011 , 8 ( 1 ): 6:1 - 6:22 .
FENG T , WANG C , ZHANG W , et al . Confidentiality protection for distributed sensor data aggregation [C ] // INFOCOM , 2008 : 56 - 60 .
LIN X , LU R , SHEN X . MDPA:multidimensional privacy-preserving aggregation scheme for wireless sensor networks [J ] . Communications and Mobile Computing , 2010 , 10 ( 6 ): 843 - 856 .
YAO Y , LIU J , XIONG N N . Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes [J ] . Sensors , 2014 , 14 ( 11 ): 21174 - 21194 .
HAI V , NGUYEN T , MITTAL N , et al . PEQ:a privacy-preserving scheme for exact query evaluation in distributed sensor data networks [C ] // SRDS . 2009 : 189 - 198 .
LI H , LIN K , LI K . Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks [J ] . Computer Communications , 2011 , 34 ( 4 ): 591 - 597 .
LI C , LIU Y . ESMART:energy-efficient slice-mix-aggregate for wireless sensor network [J ] . IJDSN , 2013
LIU C , LIU Y , ZHANG Z , et al . High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks [J ] . International Journal of Communication Systems , 2013 , 26 ( 3 ): 380 - 394 .
王涛春 , 秦小麟 , 刘亮 , 等 . 无线传感器网络中安全高效的空间数据聚集算法 [J ] . 软件学报 , 2014 , 25 ( 8 ): 1671 - 1684 .
WANG T C , QIN X L , LIU L , et al . Secure and Energy-Efficient Spatial Data Aggregation Algorithm in Wireless Sensor Networks [J ] . Journal of Software , 2014 , 25 ( 8 ): 1671 - 1684 .
杨庚 , 王安琪 , 陈正宇 , 等 . 一种低耗能的数据融合隐私保护算法 [J ] . 计算机学报 , 2011 , 34 ( 5 ): 792 - 800 .
YANG G , WANG A Q , CHEN Z D , et al . An Energy-Saving Privacy-Preserving Data Aggregation Algorithm [J ] . Chinese Journal of Computers , 2011 , 34 ( 5 ): 792 - 800
ZHANG C , LI C , ZHAO Y . A balance privacy-preserving data aggregation model in wireless sensor networks [J ] . International Journal of Distributed Sensor Networks , 2015 , 501 :937280.
WANG J , CHEN Y . Research and improvement of wireless sensor network secure data aggregation protocol based on SMART [J ] . International Journal of Wireless Information Networks , 2018 ( 11 ): 1 - 9 .
杨庚 , 李森 , 陈正宇 , 等 . 传感器网络中面向隐私保护的高精确度数据融合算法 [J ] . 计算机学报 , 2013 , 36 ( 1 ): 189 - 200 .
YANG G , LI S , CHEN ZY , et al . High-Accuracy and Privacy-Preserving Oriented Data Aggregation Algorithm in Sensor Networks [J ] . Chinese Journal of Computers , 2013 , 36 ( 1 ): 189 - 200
YANG G , LI S , XU X , et al . Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks [J ] . IJDSN , 2013 .
XU Y , LEE W , XU J , et al . Processing window queries in wireless sensor networks [C ] // ICDE . 2006 : 70 - 70 .
SHI J , ZHANG R , LIU Y , et al . PriSense:privacy-preserving data aggregation in people-centric urban sensing systems [J ] . INFOCOM , 2010 : 758 - 766 .
HE W , NGUYEN H , LIU X , et al . iPDA:an integrity-protecting private data aggregation scheme for wireless sensor networks [C ] // MILCOM . 2008 : 1 - 7 .
HE W , LIU X , NGUYEN H , et al . A cluster-based protocol to enforce integrity and preserve privacy in data aggregation [C ] // ICDCS Workshops . 2009 : 14 - 19 .
WANG T , QIN X , DING Y , et al . Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks [J ] . Wireless Personal Communications , 2019 , 8 ( 1 ): 665 - 684 .
HASAN ÇAM , SUAT ÖZDEMIR , PRASHANT NAIR , et al , et al . Energy-efficient secure pattern based data aggregation for wireless sensor networks [J ] . Computer Communications , 2006 , 29 ( 4 ): 446 - 455 .
ZHANG W , WANG C , FENG T . GP2S:Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data [C ] // PerCom . 2008 : 179 - 184 .
WANG C , WANG G , ZHANG W , et al . Reconciling privacy preservation and intrusion detection in sensory data aggregation [C ] // INFOCOM . 2011 : 336 - 340 .
范永健 , 陈红 , 张晓莹 , 等 . 无线传感器网络中隐私保护通用近似查询协议 [J ] . 计算机学报 , 2014 , 37 ( 4 ): 915 - 926 .
FAN YJ , CHEN H , ZHANG XY , et al . Privacy-Preserving Generic Approximate Query in Wireless Sensor Networks [J ] . Chinese Journal of Computers , 2014 , 37 ( 4 ): 915 - 926
SCHNEIER B P . Applied cryptography - protocols,algorithms,and source code in C [M ] . 2nd ed,New Jersey : Wiley , 1996 .
CONTI M , ZHANG L , ROY S , et al . Privacy-preserving robust data aggregation in wireless sensor networks [J ] . Security and Communication Networks , 2009 , 2 ( 2 ): 195 - 213 .
CHOI H , ZHU S , PORTA T F L . SET:Detecting node clones in sensor networks [C ] // SecureComm . 2007 : 341 - 350 .
ZHANG X , CHEN H , WANG K , et al . Rotation-based privacy-preserving data aggregation in wireless sensor networks [C ] // ICC , 2014 : 4184 - 4189 .
RAGHUNATHAN B . The complete book of data anonymization:from planning to implementation [M ] . Florida : CRC PressPress , 2013 .
GROAT M M , HE W , FORREST S . KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks [C ] // INFOCOM . 2011 : 2024 - 2032 .
WU D , YANG B , WANG H , et al . Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks [J ] . TOMCCAP , 2016 , 12 ( 4s ): 60:1 - 60:19 .
CHENG J , YANG H , WONG S H Y , et al . Design and implementation of cross-domain cooperative firewall [J ] . ICNP , 2007 : 284 - 293 .
LIU A X , CHEN F . Collaborative enforcement of firewall policies in virtual private networks [C ] // PODC . 2008 : 95 - 104 .
YAO Y , XIONG X , PARK Y H , et al . Privacy-preserving max/min query in two-tiered wireless sensor networks [J ] . Computers & Mathematics with Applications , 2013 , 65 ( 9 ): 1318 - 1325 .
KUMAR V , MADRIA S . PIP:privacy and integrity preserving data aggregation in wireless sensor networks [C ] // SRDS . 2013 : 10 - 19 .
PARAKH A , KAK S . Recursive secret sharing for distributed storage and information hiding [C ] // ANTS . 2009 : 1 - 3 .
OZDEMIR S , PENG M , XIAO Y . PRDA:polynomial regression-based privacy-preserving data aggregation for wireless sensor network [J ] . Communications and Mobile Computing , 2015 , 15 ( 4 ):(2015) 615 - 628 .
DAI H , YANG G , QIN X . EMQP:An energy-efficient privacy-preserving MAX/MIN query processing in tiered wireless sensor networks [J ] . IJDSN , 2013
LIN H Y , TZENG W G . An efficient solution to the millionaires' problem based on homomorphic encryption [C ] // ACNS . 2005 : 456 - 466 .
DAI H , WEI T , HUANG Y , et al . Random secure comparator selection based privacy-preserving max/min query processing in two-tiered sensor networks [J ] . Sensors , 2016 : 6301404:1 - 6301404:13 .
ALGHAMDI W Y , WU H , KANHERE S S . Reliable and secure end-to-end data aggregation using secret sharing in WSNs [C ] // IEEE Wireless Communications and Networking Conference . 2017 : 1 - 6 .
MAHIMKAR A , RAPPAPORT T S . SecureDAV:a secure data aggregation and verification protocol for sensor networks [C ] // GLOBECOM . 2004 : 2175 - 2179 .
YU L , LI J , CHENG S , et al . Secure continuous aggregation via sampling-based verification in wireless sensor networks [C ] // INFOCOM . 2011 : 1763 - 1771 .
YU L , LI J , CHENG S , et al . Secure continuous aggregation in wireless sensor networks [J ] . IEEE Trans.Parallel Distrib.Syst. , 2014 , 25 ( 3 ): 762 - 774 .
0
浏览量
1153
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构