2014
DOI: 10.2498/cit.1002318
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 37 publications
0
6
0
1
Order By: Relevance
“…In the smart city, sensory data integrity is essential to ensure that the content data are not revealed during data aggregation [26]. There are two approaches to protecting data aggregation: the end to end scheme [27] and the hope by hope scheme [28]. In our work, we consider the end to end scheme based on secret sharing because the data do not need to be encrypted, thus reducing energy.…”
Section: Secret Sharingmentioning
confidence: 99%
“…In the smart city, sensory data integrity is essential to ensure that the content data are not revealed during data aggregation [26]. There are two approaches to protecting data aggregation: the end to end scheme [27] and the hope by hope scheme [28]. In our work, we consider the end to end scheme based on secret sharing because the data do not need to be encrypted, thus reducing energy.…”
Section: Secret Sharingmentioning
confidence: 99%
“…针对敏感数据信息的保护贯穿于网络中的每个层次, 目前保护敏感数据的方法主要包括以下两类: 一种通过修改或隐藏原始信息的局部或全局敏感数据来保护隐私, 主要的方法有 k-匿名 [195] 、l-多样 性 [196] 、差分隐私 [197] 等; 另一种是通过加密技术对信息进行保护, 主要的方法有同态加密技术、安 全多方计算等. 在感知层, 隐私保护主要包括节点内部的隐私保护和整个传感器网络的隐私保护 [198] . 在传输层, 结合传输层安全协议采用加密技术实现数据隐私保护.…”
Section: 隐私保护unclassified
“…For preserving link information in the network, most work has concentrated on the perception layer and the transportation layer [192]. During information transmission, an adversary can obtain some private information about users through tracking the transmission path.…”
Section: Privacy Preservationmentioning
confidence: 99%