Multi-functional secure data aggregation schemes for WSNs

Ad Hoc Networks - Tập 69 - Trang 86-99 - 2018
Ping Zhang1, Jianxin Wang1, Kehua Guo1, Fan Wu2, Geyong Min3
1School of Information Science and Engineering, Central South University, China
2Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
3Department of Mathematics and Computer Science,College of Engineering, Mathematics and Physical Sciences, University of Exeter, UK

Tài liệu tham khảo

Stojmenovic, 2014, Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems, IEEE Internet Things J., 1, 122, 10.1109/JIOT.2014.2311693 He, 2016, Privacy-preserving data aggregation scheme against internal attackers in smart grids, Wirel.Netw., 22, 491, 10.1007/s11276-015-0983-3 Riker, 2016, A two-tier adaptive data aggregation approach for m2m group-communication, IEEE Sens. J., 16, 823, 10.1109/JSEN.2015.2487445 Jiang, 2015, Exact top-k nearest keyword search in large networks, 393 M. Gupta, J. Gao, X. Yan, H. Cam, J. Han, Top-k interesting subgraph discovery in information networks, in:ICDE’14, IEEE, pp.820–831. 10.1109/ICDE.2014.6816703. Lu, 2014, Secure and efficient data transmission for cluster-based wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., 25, 750, 10.1109/TPDS.2013.43 Shim, 2014, A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., PP He, 2007, Pda: privacy-preserving data aggregation in wireless sensor networks, 2045 Nath, 2008, Synopsis diffusion for robust aggregation in sensor networks, ACM Trans. Sens. Netw., 4, 7, 10.1145/1340771.1340773 Considine, 2009, Robust approximate aggregation in sensor data management systems, ACM Trans. Database Syst., 34, 6, 10.1145/1508857.1508863 Roy, 2012, Secure data aggregation in wireless sensor networks, IEEE Trans. Inf. Forensics Secur., 7, 1040, 10.1109/TIFS.2012.2189568 Castelluccia, 2009, Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Trans. Sens. Netw., 5, 1, 10.1145/1525856.1525858 Chen, 2012, Rcda: recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., 23, 727, 10.1109/TPDS.2011.219 Lin, 2013, Cdama: concealed data aggregation scheme for multiple applications in wireless sensor networks, IEEE Trans. Knowl. Data Eng., 25, 1471, 10.1109/TKDE.2012.94 Han, 2011 Jose, 2013, Energy efficient recoverable concealed data aggregation in wireless sensor networks, 322 Lu, 2012, EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications, IEEE Trans. Parallel Distrib. Syst., 23, 1621, 10.1109/TPDS.2012.86 Perrig, 2001, Spins: security protocols for sensor networks, 189 NOAA, Tropical atmosphere ocean (tao) project, 2015, http://www.pmel.noaa.gov/tao. Liu, 2008, Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks, 245 De Meulenaer, 2008, On the energy cost of communication and cryptography in wireless sensor networks, 580 Cheng, 2009, Sampling based (ϵ, δ)-approximate aggregation algorithm in sensor networks, 273 S. Cheng, J. Li, Q. Ren, L. Yu, Bernoulli sampling based (ϵ, δ)-approximate aggregation in large-scale sensor networks, in:INFOCOM’10, IEEE, pp. 1-9. 10.1109/INFCOM.2010.5461929. Li, 2012, (ϵ, δ)-approximate aggregation algorithms in dynamic sensor networks, IEEE Trans. Parallel Distrib. Syst., 23, 385, 10.1109/TPDS.2011.193 G. Cormode, K. Yi, Tracking distributed aggregates over time-based sliding windows, in: SSDBM’12, Springer, pp.416–430. 10.1007/978-3-642-31235-9_28. Fang, 2014, Approximate multiple count in wireless sensor networks, 1474 Castelluccia, 2005, Efficient aggregation of encrypted data in wireless sensor networks, 109 Rivest, 1978, On data banks and privacy homomorphisms, Found.Secure Comput., 4, 169 Acharya, 2005, Secure comparison of encrypted data in wireless sensor networks, 47 Agrawal, 2004, Order preserving encryption for numeric data, 563 Fan, 2014, Privacy-enhanced data aggregation scheme against internal attackers in smart grid, IEEE Trans. Ind. Inf., 10, 666, 10.1109/TII.2013.2277938 Rezvani, 2015, Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks, IEEE Trans. Dependable Secure Comput., 12, 98, 10.1109/TDSC.2014.2316816 Xu, 2017, Pavs: a new privacy-preserving data aggregation scheme for vehicle sensing systems, Sensors, 17, 500, 10.3390/s17030500 Shen, 2016, A lightweight multi-layer authentication protocol for wireless body area networks, Future Gener. Comput. Syst., 12, 1 Fu, 2017, Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data, IEEE Trans. Inf. Forensics Secur., 12, 1874, 10.1109/TIFS.2017.2692728 Xia, 2016, A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., 27, 340, 10.1109/TPDS.2015.2401003 Ma, 2015, Kdvem: a k-degree anonymity with vertex and edge modification algorithm, Computing, 97, 1165, 10.1007/s00607-015-0453-x Shen, 2017, An efficient public auditing protocol with novel dynamic structure for cloud data, IEEE Trans. Inf. Forensics Secur., 12, 2402, 10.1109/TIFS.2017.2705620