Abstract
Wireless sensor network (WSN) technology has the potential to change the way we live, work, protect and do business, with applications in entertainment, travel, industry, telemedicine, disaster and emergency management. Data aggregation is key technique for power-efficient information acquisition in WSNs. However, data privacy during data aggregation is an important issue when the WSN is deployed in sensitive data applications, such as telemedicine. If the issues associated with data privacy are not seriously considered, the technology would not be trustingly used for many valuable applications. The existing privacy preserving data aggregation protocols provide a method to sustain privacy of collected sensor’s data from external and internal adversaries during data aggregation in WSNs. The basic aim of the paper is to investigate the critical aspects of the existing privacy preserving data aggregation protocols for WSNs and highlight their major limitations. We claim that in future such limitations can be corrected. Our ongoing work is to propose an alternative solution to overcome such limitations, but this will be presented in a future paper.
Keywords
- Sensor Node
- Wireless Sensor Network
- Cluster Head
- Data Aggregation
- Stream Cipher
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download conference paper PDF
References
Singh, S.K., Singh, M.P., Singh, D.K.: Applications, Classifications, and Selections of Energy-Efficient Routing Protocols for Wireless Sensor Networks. International Journal of Advanced Engineering Sciences and Technologies (2010)
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Pister, D.C.K.: System architecture directions for networked sensors. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (2000)
Maraiya, K., Kant, K., Gupta, N.: Wireless Sensor Network: A Review on Data Aggregation. International Journal of Scientific and Engineering Research (2011)
Madden, S., Szewczyk, R., Franklin, M., Culler, D.: Supporting aggregate queries over ad-hoc sensor networks. In: Workshop on Mobile Computing and Systems Applications (2002)
Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Adhoc and Sensor Networks (2004)
Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of Network Density on Data aggregation in Wireless Sensor Networks. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (2002)
Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy-preserving in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks (2009)
Bista, R., Chang, J.-W.: Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey. Sensors (2010)
Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Transactions on Mobile Computing (2006)
Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Proc. Information Security Conf., pp. 471–483 (October 2002)
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient Aggregation of Encrypted Data in WSN. In: MobiQuitous. IEEE Computer Society (2005)
Castellucia, C., Chan, A.C.-F., Mykletun, E., Tsudnik, G.: Efficient and Provably Secure Aggregation of encrypted data in WSNs. ACM Transactions on Sensor Networks 5(3) (May 2009)
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the Association for Computing Machinay (1986)
He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. IEEE INFOCOM (2007)
Madden, S., Franklin, M.J., Hellerstein, J.M.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. OSDI (2002)
Conti, M., Zhang, L., Roy, S., Pietro, R.D., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in WSNs. Secur. Commun. Netw. (2009)
Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting Node Clones in Sensor Networks. In: Proceedings of IEEE 3rd International Conference on Security and Privacy in Communication Networks (2007)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (November 2002)
He, W., Nguyen, H., Liu, X., Nahrstedt, K., Abdelzaher, T.: iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks. In: Proceedings of IEEE Military Communication Conference, MILCOM, San Diego, CA, USA (November 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Memon, I. (2012). An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs. In: Park, J.J., Zomaya, A., Yeo, SS., Sahni, S. (eds) Network and Parallel Computing. NPC 2012. Lecture Notes in Computer Science, vol 7513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35606-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-35606-3_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35605-6
Online ISBN: 978-3-642-35606-3
eBook Packages: Computer ScienceComputer Science (R0)
