Education, Science, Technology, Innovation and Life
Open Access
Sign In

An Improved Data Fusion Method IICKPAD for Privacy Protection in Wireless Sensor Networks

Download as PDF

DOI: 10.23977/jnca.2017.21001 | Downloads: 17 | Views: 1068

Author(s)

Zhang Shaomin 1, Li Ran 1, Wang Baoyi 1

Affiliation(s)

1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China

Corresponding Author

Zhang Shaomin

ABSTRACT

Aiming at the privacy and security of data acquisition and monitoring in wireless sensor networks, an improved data fusion method, IICKPDA, is proposed for privacy protection in wireless sensor networks. The method is based on the ICKPDA algorithm, which optimizes the deadline between the same layer and the different layers,which  can be randomly selected by the adjacent nodes of the data fragments to be transmitted, and also the non-leaf nodes which only the data is not collected to improve the characteristics of the data. The improved algorithm avoids the redundancy of the intermediate fusion process and protects the collected monitoring data, which improves the data fusion precision and the fusion efficiency of the intermediate fusion node. Theory and related experiments demonstrate the feasibility of the method.

KEYWORDS

Wireless sensor networks, Data fusion, Privacy protection, Integrity

CITE THIS PAPER

Shaomin, Z., Ran, L., Baoyi, W. (2017) An Improved Data Fusion Method IICKPAD for Privacy Protection in Wireless Sensor Networks. Journal of Network Computing and Applications (2017) Vol.2, Num.1:1-6.

REFERENCES

[1] Culler D, Estrin D, Srivastava M. Guest editors' introduction: overview of sensor networks[J]. IEEE Computer 2004; 37(8): 41-49.
[2] Zhang L, Zhang H q Mauro Conti, et al. Preserving privacy against external and internal threats in WSN data aggregation}J}. Telecommunication Systems, 2013, 52(4): 2163-2176.
[3] Hu Wei, Zhao Wenhui. Data Fusion Approach for the Energy Internet Based on Time Window and  the Adaptive Weights[J]. Journal of Systems Management, 2016,05: 907-913.
[4] Ozdemir S and Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview[J]. Computer Networks, 2009, 53(12): 2022-2037.
[5] Madden S, Franklin M J, and Hellerstein J M. TAG: a tiny aggregation service for Ad-hoc sensor net-works[C].Proceedings of the 5th Symposium on Operating SystemsDesign and Implementation, Boston, 2002: 131-146.
[6] Eschenauer L and Gligor V D. A key-management scheme for distributed sensor networks[C]. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, 2002: 41-47.
[7] Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of the 40th IEEE International Conference on Communications, Seoul, 2005: 3044-3049.
[8] Westhoff D, Girao J, and Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation[J].IEEE Transactions on Mobile Computing, 2006, 5(10):1417-1431.
[9] He W, Liu X, Nguyen H, et al.. PDA: privacy-preserving data aggregation in wireless sensor networks[C]. Proceedings of the 26th IEEE International Conference on Computer Communications(INFOCOM), Anchorage, 2007: 2045-2053.
[10] YANG Geng, WANG An-qi, CHEN Zheng-yu, et al. A Energy-Saving Privacy-Protection Data Algorithm[J]. Journal of Computers, 2011, 34 (5): 792-800.
[11] YANG Geng, LI Sen, CHEN Zhengyu, XU Jian, YANG Zhen.High. High-Accuracy and Privacy-Preserving Oriented Data Fusion Algorithm in Sensor Networks [J]. Journal of Computers, 2013,01: 189-200.
[12] He W,Nguyen H,Liu X, et al. iPDA: an integrity- protecting private data aggregation scheme for wireless sensor networks [C] //Military Communications Conference. San Diego, CA:[s. N.],2008: 1-7.
[13] Bista R, Yoo H K, and Chang J W. A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks[C]. Proceedings of the 10th IEEE International Conference on Computer and Information Technology,Bradford, 2010: 2463-2470.
[14] ZHAO Dan, YANG Geng. A Complex Field - based Integrity - protecting Data Aggregation Algorithm[J]. Journal of Computer Technology and Development, 2012, (08): 150-154 + 158. 
[15] Zhou Qiang, Yang Geng, Li Sen, Chen Lei. An Integrity-checking Privacy Data Aggregation Algorithm[J]. Journal of Electronics & Information Technology, 2013, (06): 1277-1283.

Downloads: 349
Visits: 22656

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.