low energy-consuming secure data aggregation),该方法根据最短路径原则选择邻居节点,并且采用 Prim 最小生成树算法建立簇内数据融合路径。仿真结果表明,该方法可以有效降低节点能耗和簇头节点被捕获的概率,同时保证节点数据的隐私性。
Abstract
For the Internet of things(IoT) secure data aggregation issues
data privacy-preserving and limited computation ability and energy of nodes should be tradeoff.Based on analyzing the pros-and-cons of current works
a low energy-consuming secure data aggregation method (LCSDA) was proposed.This method uses shortest path principle to choose neighbor nodes and generates the data aggregation paths in the cluster based on prim minimum spanning tree algorithm.Simulation results show that this method could effectively cut down energy consumption and reduce the probability of cluster head node being captured
in the same time preserving data privacy.
关键词
Keywords
references
LIU C X , LIU Y , ZHANG Z J . High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks [J ] . International Journal of Communication Systems , 2013 , 26 ( 3 ): 380 - 394 .
YANG G , LI S , CHEN Z Y . High-accuracy and privacy-preserving oriented data aggregation algorithm in sensor networks [J ] . Chinese Journal of Computers , 2013 , 36 ( 1 ): 189 - 200 .
WANG Q , LI C , WAN Y D . Low power data fusion for sensor node constrained by real time management in WSN [J ] . Journal on Communications , 2008 , 29 ( 11 ): 220 - 226 .
HE W B , LIV X , NGNYEN H . PDA:privacy-preserving data aggregation in wireless sensor networks [A ] . Proc of the 26th IEEE International Conference on Computer Communications [C ] . 2007 . 2045 - 2053 .
FENG Y F , LIU Y B . Low energy-consuming cluster-based private data aggregation [J ] . Application Research of Computers , 2013 , 30 ( 3 ): 885 - 888 .
CAM H , OZDEMIR S , et al . ESPDA:energy efficient and secure pattern-based data aggregation for wireless sensor networks [A ] . Proc of IEEE Sensors [C ] . 2003 . 732 - 736 .
SANLI H O , OZDEMIR S , CAM H . SRDA:secure reference-based data aggregation protocol for wireless sensor networks [A ] . Proc of the IEEE VTC Fall Conference [C ] . 2004 . 4650 - 4654 .
WESTHOFF D , GIRAO J , ACHARYA M . Concealed data aggregation for reverse multicast traffic in sensor networks:encryption key distribution and routing adaptation [J ] . IEEE Transaction on Mobile Computing , 2006 , 5 ( 10 ): 1417 - 1431 .
CASTELLUCCIA C , MYKLETUN E , TSUDIK G . Efficient aggregation of encrypted data in wireless sensor networks [A ] . Proc of Second Conference on Mobile and Ubiquitous Systems [C ] . 2005 . 109 - 117 .
LI H , LIN K , LI K . Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks [J ] . Computer Communication , 2011 , 34 : 591 - 597 .
YANG G , WANG A Q , CHENG Z Y . An energy-saving privacy-preserving data aggregation algorithm [J ] . Chinese Journal of Computers , 2011 , 34 ( 5 ): 792 - 800 .
OZDEMIR S . Secure and reliable data aggregation for wireless sensor networks [A ] . Proc of the 4th International Conference on Ubiquitous Computing Systems [C ] . 2007 . 102 - 109 .
DU W L , DENG J , YUNGHSIANG S , et al . A witness-based approach for data fusion assurance in wireless sensor networks [A ] . Proc of IEEE Global Communications Conference (GLOBECOM) [C ] . 2003 . 1435 - 1439 .
XU J , YANG G , CHEN Z Y , et al . Research of privacy-preserving technology in wireless sensor network data aggregation [J ] . Computer Engineering , 2012 , 38 ( 15 ): 134 - 138 .
LI W L . Research and Implementation on Lightweight Secure Data Aggregation Scheme in Wireless Sensor Networks [D ] . Jiangsu:Nanjing University of Posts and Telecommunications , 2012 .