2020
DOI: 10.1186/s13638-020-1643-6
|View full text |Cite
|
Sign up to set email alerts
|

Energy-efficient privacy-preserving data aggregation protocols based on slicing

Abstract: Wireless sensor networks (WSNs) have become one of the most vigorous techniques in the network domain. However, the sensor nodes of WSNs tend to become the target of attackers due to the broadcast communication mode and the unattended deployment nature. Although it can prevent the sensitive data from being compromised, Slice-Mix-AggRegaTe (SMART) needs to exchange messages frequently in a network, which put tremendous overhead on the sensor nodes with limited resources. Faced with these issues, this paper prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…[31], Kong, et al [32], Liu, et al [33], and Liu, et al [34] have all proposed protocols for data aggregation in the smart grid. In the future, secure multi-party computation [14][15][16]35] may also be useful for data aggregation.…”
Section: Related Workmentioning
confidence: 99%
“…[31], Kong, et al [32], Liu, et al [33], and Liu, et al [34] have all proposed protocols for data aggregation in the smart grid. In the future, secure multi-party computation [14][15][16]35] may also be useful for data aggregation.…”
Section: Related Workmentioning
confidence: 99%
“…The SECPDA method, in contrast, has a poor throughput, a moderate energy consumption, and a considerable latency. An energy-efficient, privacy-preserving data aggregation method based on slicing or the EPPA model is suggested by the study described in [2]. This protocol aims to minimize the wait time.…”
Section: Literature Reviewmentioning
confidence: 99%
“…slicing SDA, confidence SDA, encryption SDA, privacy SDA, and anomaly detection SDA, security goals, and network topologies. To save communication costs and protect private data, data decomposition technique is implemented instead of slicing in privacy-preserving data aggregation protocols [36].…”
Section: Security and Mobility In Data Aggregation Wsns Andmentioning
confidence: 99%