ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks

Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes w...

Full description

Bibliographic Details
Main Authors: Liehuang Zhu, Zhen Yang, Mingzhong Wang, Meng Li
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2013-05-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/241261
_version_ 1797710225534353408
author Liehuang Zhu
Zhen Yang
Mingzhong Wang
Meng Li
author_facet Liehuang Zhu
Zhen Yang
Mingzhong Wang
Meng Li
author_sort Liehuang Zhu
collection DOAJ
description Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes with challenges for data confidentiality protection. Many existing confidentiality preserving aggregation protocols have to transfer list of sensors' ID for base station to explicitly tell which sensor nodes have actually provided measurement. However, forwarding a large number of node IDs brings overwhelming extra communication overhead. In this paper, we propose provably secure aggregation scheme perturbation-based efficient confidentiality preserving protocol (PEC2P) that allows efficient aggregation of perturbed data without transferring any ID information. In general, environmental data is confined to a certain range; hence, we utilize this feature and design an algorithm to help powerful base station retrieve the ID of reporting nodes. We analyze the accuracy of PEC2P and conclude that base station can retrieve the sum of environmental data with an overwhelming probability. We also prove that PEC2P is CPA secure by security reduction. Experiment results demonstrate that PEC2P significantly reduces node congestion (especially for the root node) during aggregation process in comparison with the existing protocols.
first_indexed 2024-03-12T06:49:06Z
format Article
id doaj.art-46cf283a059b4f168394ba8b51783e25
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T06:49:06Z
publishDate 2013-05-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-46cf283a059b4f168394ba8b51783e252023-09-03T00:23:49ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-05-01910.1155/2013/241261ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor NetworksLiehuang ZhuZhen YangMingzhong WangMeng LiWireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. Data aggregation is considered to help reduce communication overhead with in-network processing, thus minimizing energy consumption and maximizing network lifetime. Meanwhile, it comes with challenges for data confidentiality protection. Many existing confidentiality preserving aggregation protocols have to transfer list of sensors' ID for base station to explicitly tell which sensor nodes have actually provided measurement. However, forwarding a large number of node IDs brings overwhelming extra communication overhead. In this paper, we propose provably secure aggregation scheme perturbation-based efficient confidentiality preserving protocol (PEC2P) that allows efficient aggregation of perturbed data without transferring any ID information. In general, environmental data is confined to a certain range; hence, we utilize this feature and design an algorithm to help powerful base station retrieve the ID of reporting nodes. We analyze the accuracy of PEC2P and conclude that base station can retrieve the sum of environmental data with an overwhelming probability. We also prove that PEC2P is CPA secure by security reduction. Experiment results demonstrate that PEC2P significantly reduces node congestion (especially for the root node) during aggregation process in comparison with the existing protocols.https://doi.org/10.1155/2013/241261
spellingShingle Liehuang Zhu
Zhen Yang
Mingzhong Wang
Meng Li
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
International Journal of Distributed Sensor Networks
title ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_full ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_fullStr ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_full_unstemmed ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_short ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks
title_sort id list forwarding free confidentiality preserving data aggregation for wireless sensor networks
url https://doi.org/10.1155/2013/241261
work_keys_str_mv AT liehuangzhu idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
AT zhenyang idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
AT mingzhongwang idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks
AT mengli idlistforwardingfreeconfidentialitypreservingdataaggregationforwirelesssensornetworks