IEEE INFOCOM 2008 - The 27th Conference on Computer Communications 2008
DOI: 10.1109/infocom.2008.20
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality Protection for Distributed Sensor Data Aggregation

Abstract: Abstract-Efficiency and security are two basic requirements for sensor network design. However, these requirements could be sharply contrary to each other in some scenarios. For example, innetwork data aggregation can significantly reduce communication overhead and thus has been adopted widely as a means to improve network efficiency; however, the adoption of in-network data aggregation may prevent data from being encrypted since it is a prerequisite for aggregation that data be accessible during forwarding. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(44 citation statements)
references
References 9 publications
0
42
0
Order By: Relevance
“…However, it is not a good candidate because in-network aggregation cannot be applied. There are some works about privacypreserving aggregation in sensor network have already be done (Girao et al, 2005;Castelluccia et al, 2005;He et al, 2007;Feng et al, 2008;Zhang et al, 2008;Westhoff et al, 2006;Roy et al, 2006;Shi et al, 2010). Due to space limitation, we only briefly review two works, PDA and PriSense, which are most close to our work.…”
Section: Related Workmentioning
confidence: 99%
“…However, it is not a good candidate because in-network aggregation cannot be applied. There are some works about privacypreserving aggregation in sensor network have already be done (Girao et al, 2005;Castelluccia et al, 2005;He et al, 2007;Feng et al, 2008;Zhang et al, 2008;Westhoff et al, 2006;Roy et al, 2006;Shi et al, 2010). Due to space limitation, we only briefly review two works, PDA and PriSense, which are most close to our work.…”
Section: Related Workmentioning
confidence: 99%
“…Our generic privacy preserving schemes are inspired by existing schemes in references [22,23,24,26]. In these schemes, each data item is encrypted using homomorphic encryption; hence, aggregation can be conducted on the ciphertext.…”
Section: Generic Privacy Preserving Schemes For Data Aggregationmentioning
confidence: 99%
“…As mentioned above, designing a data aggregation scheme that can both preserve privacy and detect integrity attacks still remains as a challenging problem due to the apparent contradiction between the two goals. As in references [32,33], to test the integrity of aggregation usually needs the knowledge about the actual data being aggregated and results from the aggregation, which contradict with the requirement of preserving data privacy; meanwhile, as in references [25,26,27], to preserve the privacy of data before and after aggregation can be abused by malicious aggregators to modify the aggregation results without being detected.…”
Section: A Privacy and Integrity Protection Scheme For Data Aggregationmentioning
confidence: 99%
See 2 more Smart Citations