Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1282))

  • 1034 Accesses

Abstract

Underwater sensor network is deployed in unattended underwater environment, which can be used to collect sensitive information. It has problems such as low bandwidth, high energy consumption and difficulty in ensuring data security. In order to reduce energy consumption and ensure data security, this paper proposes a data privacy protection scheme for underwater network. This scheme makes an upload decision when the node collects data, and compresses the uploaded data in the ordinary node to reduce the data transmission volume and energy consumption; furthermore, the cluster head node aggregates the data after receiving the data packets sent by the node to reduce the data redundancy; finally, the data packets are segmented to ensure the data security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fu, S., Jiang, Q., Ma, J.F.: A privacy protection data aggregation scheme for wireless sensor networks. J. Comput. Res. 053(009), 2030–2038 (2016)

    Google Scholar 

  2. Sran, S.S., Kaur, L., Kaur, G.: Energy aware chain based data aggregation scheme for wireless sensor network. In: Icesa. IEEE (2015)

    Google Scholar 

  3. Yessembayev, A., Sarkar, D., Sikder, F.: Detection of good and bad sensor nodes in the presence of malicious attacks and its application to data aggregation. IEEE Trans. Signal Inf. Process. Netw. 4(3), 549–563 (2018)

    Google Scholar 

  4. Wang, N., Chiang, Y., Hsieh, C., et al.: An efficient grid-based data aggregation scheme for wireless sensor networks. J. Internet Technol. 19(7), 2197–2205 (2018)

    Google Scholar 

  5. Shenyang University of Chemical Technology. A security data fusion method based on dynamic segmentation technology: CN201710584414.7, March 11 2017

    Google Scholar 

  6. Zou, Y.F., Zhao, J.: Discussion on data aggregation scheme of wireless sensor network that can determine the attacked node in time. China New Commun. 21(4), 80–81 (2019). https://doi.org/10.3969/j.issn.1673-4866.2019.04.064

    Article  Google Scholar 

  7. Qin, D., Zhang, Y., Ma, J., et al.: A distributed collision-free data aggregation scheme for wireless sensor network. Int. J. Distrib. Sens. Netw. 14(8) (2018)

    Google Scholar 

  8. Shobana, M., Sabitha, R., Karthik, S., et al.: Cluster-based systematic data aggregation model (CSDAM) for real-time data processing in large-scale WSN. Wirel. Pers. Commun., 1–19 (2020)

    Google Scholar 

  9. Lin, H., Wei, W., Zhao, P., et al.: Energy-efficient compressed data aggregation in underwater acoustic sensor networks. Wirel. Netw. 22(6), 1985–1997 (2016)

    Article  Google Scholar 

  10. Harb, H., Makhoul, A., Tawbi, S., et al.: Comparison of different data aggregation techniques in distributed sensor networks. IEEE Access 5, 4250–4263 (2017)

    Google Scholar 

  11. Fang, W., Wen, X., Xu, J., et al.: CSDA: a novel cluster-based secure data aggregation scheme for WSNs. Clust. Comput. 22(3), 5233–5244 (2019)

    Article  Google Scholar 

  12. Shen, L.; Yi, X.M.; Chen, X.Y.: Abnormal data driven WSNs data acquisition and routing algorithm. Sens. Microsyst. 39(4), 140–143+147 (2020). https://doi.org/10.13873/J.1000-9787(2020)04-0140-04

  13. Huang, X., Sun, S., Yang, Q., et al.: Data uploading strategy for underwater wireless sensor networks. Sensors 19(23), 5265 (2019)

    Google Scholar 

  14. Wang, L.J., Gao, Z.Y., Yao, P.S.: Data compression algorithm based on spatiotemporal correlation in sensor network. J. Jilin Univ. (Sci. Ed.) 58(2), 337–342 (2020). https://doi.org/10.13413/j.cnki.jdxblxb.2019115

    Article  Google Scholar 

  15. Jin, L.: Analysis of data transmission encryption algorithm based on WSN environment. Digit. World (010), 96–97 (2017)

    Google Scholar 

  16. Ye, M.L.: Privacy protection scheme research based on data aggregation technology of wireless sensor network. Electron. Des. Eng. 26(18), 127–131 (2018)

    Google Scholar 

  17. Zhang, X., Liu, X., Yu, J., et al.: Energy-efficient privacy preserving data aggregation protocols based on slicing. In: Green Computing and Communications, pp. 546–551 (2019)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiuling Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, D., Sun, S., Huang, X., Yang, Q. (2021). A Data Privacy Protection Scheme for Underwater Network. In: MacIntyre, J., Zhao, J., Ma, X. (eds) The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. SPIOT 2020. Advances in Intelligent Systems and Computing, vol 1282. Springer, Cham. https://doi.org/10.1007/978-3-030-62743-0_125

Download citation

Publish with us

Policies and ethics