Advertisement

A Secure Privacy Preserved Data Aggregation Scheme in Non Hierarchical Networks

  • Arijit Ukil
  • Jaydip Sen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6785)

Abstract

Privacy is an important issue in today’s context of extreme penetration of Internet and mobile technologies. Recently, large-scale data collection and integration efforts increased privacy concerns. It becomes very challenging to ensure the protection of user’s private data. In this paper, we address this issue from a practical deployment point of view. We have considered a non hierarchical or flat wireless sensor network, where there are several sensor/sink nodes reporting to a query server and the server aggregates the data sent by the sink nodes, while preserving the privacy of the data. The philosophy of this work is that the server nodes cannot be able to find out the content of the data of the sink nodes. It can only perform the aggregation operation and execute further processing on the aggregated data only. The scheme presented in this paper has the advantages of low computation time even in the presence of large number of sink nodes. The proposed scheme unlike many other published schemes is highly scalable [3, 10]. We demonstrate through simulation results the efficacy of our scheme in terms of privacy disclosure probability and computational efficiency.

Keywords

security privacy-preservation data aggregation wireless sensor networks in-network processing set top box 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Yao, A.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982)Google Scholar
  2. 2.
    Sorniotti, A., Gomez, L., Wrona, K., Odorico, L.: Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey. J. Inf. Ass. Sec. 2, 189–199 (2007)Google Scholar
  3. 3.
    He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.T.: PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks. In: IEEE INFOCOM, pp. 2045–2053. IEEE Press, New York (2007)Google Scholar
  4. 4.
    Oliveira, S.R.M., Zaïane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 67–82. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Sweeney, L.: Privacy Technologies for Homeland Security. Testimony before the Privacy and Integrity Advisory Committee of the Department of Homeland Security, Boston, MA, June 15 (2005)Google Scholar
  6. 6.
    Ukil, A.: Security and Privacy in Wireless Sensor Networks. In: Smart Wireless Sensor Networks, Intechweb, Croatia, pp. 395–418 (2010)Google Scholar
  7. 7.
    Sen, J.: An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks. International Journal Scalable Computing: Practice and Experience 11(4), 345–358 (2010)Google Scholar
  8. 8.
    Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random-data perturbation techniques and privacy-preserving data mining. Knowledge and Information Systems 7, 387–414 (2005)CrossRefGoogle Scholar
  9. 9.
    Chan, H., Perrig, A., Przydatek, B., Song, D.: SIA: Secure Information Aggregation in Sensor Networks. J. Com. Sec. 5(1), 69–102 (2007)Google Scholar
  10. 10.
    Li, N., Zhang, N., Das, S., Thuraisingham, B.: Privacy-preserving in wireless sensor networks: A state-of-the-art survey. In: Ad Hoc Networks, vol. 7, pp. 1501–1514. Elsevier, Amsterdam (2009)Google Scholar
  11. 11.
    Conti, M., Zhang, L., Roy, S., Di Pietro, R., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in wireless sensor networks. In: Secur. Commun. Netw., vol. 2, pp. 195–213 (2009)Google Scholar
  12. 12.
    Huang, Q., Wang, H.J., Borisov, N.: Privacy-preserving friends troubleshooting network. In: Symposium on Network and Distributed Systems Security, pp. 184–194 (2005)Google Scholar
  13. 13.
    Television Audience Measurement, http://www.tamindia.com
  14. 14.
    Sen, J.: A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. Communications in Computer and Information Science, vol. 89, pp. 538–547. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conf. Computer and Communication Security, pp. 41–47. ACM, New York (2002)Google Scholar
  16. 16.
    Ukil, A., Sen, J.: Secure multiparty privacy preserving data aggregation by modular arithmetic. In: International Conference on Parallel Distributed and Grid Computing (PDGC), pp. 344–349. IEEE Press, Los Alamitos (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Arijit Ukil
    • 1
  • Jaydip Sen
    • 1
  1. 1.Innovation LabTata Consultancy services BIPLKolkataIndia

Personalised recommendations