2020
DOI: 10.1109/access.2019.2961512
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs

Abstract: Data aggregation is a fundamental and efficient algorithm to reduce the communication overhead and energy consumption in wireless sensor networks (WSNs). However, WSNs need both energy-efficient and privacy-preserving when being deployed in an unprotected area. In this paper, we propose an energy-efficient and privacy-preserving data aggregation algorithm CBDA (the chain-based data aggregation). In the CBDA, sensor nodes will be organized as a tree topology. The leaf nodes of the tree sequentially reconnect wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…Hu et al 27 employed a chain based data aggregation (CBDA) methodology for enhancing the performance and efficiency of WSN with minimized overhead and energy consumption. This work mainly objects to ensure the privacy and reliability of data transmission by using the multiparty computation method.…”
Section: Related Workmentioning
confidence: 99%
“…Hu et al 27 employed a chain based data aggregation (CBDA) methodology for enhancing the performance and efficiency of WSN with minimized overhead and energy consumption. This work mainly objects to ensure the privacy and reliability of data transmission by using the multiparty computation method.…”
Section: Related Workmentioning
confidence: 99%
“…In a centralized system, a huge amount of raw data from end devices is collected by central servers [ 28 ] and protected by using trust-based service management protocol [ 29 ], e.g., IoT-HiTrust [ 30 ]. However, the system transfers data over the network, allowing the leakage of critical data [ 31 ] and the increasing risk of side-channel attack [ 32 ]. The edge computing framework utilizes federated learning technology, prevents direct access to the data, moves the compute resource to the edge, and prevents the raw data exchange to the central server [ 33 , 34 , 35 , 36 ].…”
Section: Related Workmentioning
confidence: 99%
“…erefore, TA should be able to revoke the keys from malicious IDs. Actually, the assumption of this model is widely used in previous work [18,19,21,22].…”
Section: System Modelmentioning
confidence: 99%
“…First of all, data aggregation requires a new mechanism to realize the key distribution of large-scale devices. Some existing aggregation schemes have strong security [18,19], but they use traditional one-to-one encryption. ese aggregation structures are complicated because the number of secret keys increases with the number of devices.…”
Section: Introductionmentioning
confidence: 99%