Font Size: a A A

Research On Privacy-Preserving Secure Data Aggregation Schemes In Wireless Sensor Networks

Posted on:2015-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q YangFull Text:PDF
GTID:2348330518971680Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of wireless communication technology, network technology and low-energy-consuming embedded technology, it introduces wireless sensor network. Because of the low consuming energy, low cost of the node and the distributed structures and self-organized topology, it brings about the reform of information awareness. The wireless sensor network realizes the nodes reading the data of current environment, data collection and data transmission such three functions. Meanwhile, wireless sensor network, communication technology and computer science technology compose of three essential elements of the information technology. But the resource of nodes is limited, how to improve the efficiency of the data collection schemes and prolong the whole using time of the network is the first problem to be solved.Researchers introduced the concept of data aggregation to reduce the consumption of energy and improve the efficiency of data transmission so as the accuracy of data aggregated results. The techniques of data aggregation could not only improve the accuracy of aggregated results but also reduce the energy costs. At the same time, the security of data must be considered. So the secure data aggregation or privacy-preserving data aggregation is the combination of data aggregation and security of information, the privacy-preserving data aggregation requires the privacy of the users' data and the high efficiency of data aggregation.In this paper, the current researches about secure data aggregation and privacy-preserving data aggregation will be introduced and summarized, then explaining some concepts of secure data aggregation and privacy preservation and a lot of methods about privacy-preserving data aggregation and integrity enforced aggregation mechanism. Based on some of these methods, proposing a series methods of energy-efficient privacy preservation data aggregation, E-CPDA and integrity enforced mechanism, iE-CPDA.E-CPDA can not only ensure the process of data aggregation security but also reduce the communication complexity and computational complexity within the cluster on the condition of no loss data. It can reduce the communication and computation and improve the service cycle in the whole wireless sensor network. It can let the cluster head node chooses one collaboration node in the cluster and aggregates data with the collaboration node while in CPDA all nodes in one cluster must aggregate data with cluster head. The simulation results show that the E-CPDA could protect the privacy preservation and get the precise aggregation results with less communication and computation consumption compared with CPDA.iE-CPDA is an integrity enforced method based on E-CPDA. It is different from iCPDA because all nodes in one cluster would verify the aggregation result in iCPDA while in iE-CPDA the verification of the aggregation result can only happen between cluster head and collaboration node. But there is a disadvantage of E-CPDA,it chooses collaborative node randomly and will cause a problem that energy consumption imbalanced while the cluster has many nodes. So we introduce a method based on reputation value. The simulation results of energy consumption between iE-CPDA and iCPDA show that iE-CPDA can not only protect the confidentiality and integrity of data but also reduce the computation and communication.
Keywords/Search Tags:wireless sensor network, privacy-preservation, secure data aggregation, integrity verification
PDF Full Text Request
Related items