Industrial IoT Technologies and Applications. Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedings

Research Article

Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks

Download
173 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-60753-5_13,
        author={Kai Zhang and Haiping Huang and Yunqi Wang and Ruchuan Wang},
        title={Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks},
        proceedings={Industrial IoT Technologies and Applications. Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25--26, 2017, Proceedings},
        proceedings_a={INDUSTRIALIOT},
        year={2017},
        month={9},
        keywords={Wireless sensor networks Data aggregation Privacy Data link Homomorphic transformation},
        doi={10.1007/978-3-319-60753-5_13}
    }
    
  • Kai Zhang
    Haiping Huang
    Yunqi Wang
    Ruchuan Wang
    Year: 2017
    Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks
    INDUSTRIALIOT
    Springer
    DOI: 10.1007/978-3-319-60753-5_13
Kai Zhang, Haiping Huang,*, Yunqi Wang, Ruchuan Wang
    *Contact email: hhp@njupt.edu.cn

    Abstract

    Data privacy-protection is of great importance during data aggregation in Wireless Sensor Networks. A distinctive data aggregation scheme based on data link is proposed in this paper. To be specifically, the data link is formed according to energy consumption and distance. For each round of the data aggregation, nodes within a certain cluster perform data aggregation together by subtracting the base value(given by cluster head) from its real value, and then add the random number (generated by itself) for privacy protection. The cluster head will form the information matrix according to the data from the link, and then perform homomorphic transformation. Finally, the data reach the base station which will feed back the aggregation results effectively. Compared with previous work, our scheme can effectively protect data privacy and cause low computation overhead and energy consumption. Meanwhile, the base station can acquire the correlation between nodes in certain clusters.