2020
DOI: 10.1155/2020/9754973
|View full text |Cite
|
Sign up to set email alerts
|

Query Privacy Preserving for Data Aggregation in Wireless Sensor Networks

Abstract: Wireless Sensor Networks (WSNs) are increasingly involved in many applications. However, communication overhead and energy efficiency of sensor nodes are the major concerns in WSNs. In addition, the broadcast communication mode of WSNs makes the network vulnerable to privacy disclosure when the sensor nodes are subject to malicious behaviours. Based on the abovementioned issues, we present a Queries Privacy Preserving mechanism for Data Aggregation (QPPDA) which may reduce energy consumption by allowing multip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…Conserving data mining to protect privacy leakage of user information [45] P18 Using a telematics control unit (TCU) for remote control of vehicles [46] P19 Adopting CVSS (common vulnerability scoring system) to measure the severity of software vulnerabilities [47] Machine learning system P20 Performing data sanitization and robust learning to defend against misleading in the learning process [48] P21 Ensuring the privacy of data by privacy homomorphism [49]…”
Section: P17mentioning
confidence: 99%
“…Conserving data mining to protect privacy leakage of user information [45] P18 Using a telematics control unit (TCU) for remote control of vehicles [46] P19 Adopting CVSS (common vulnerability scoring system) to measure the severity of software vulnerabilities [47] Machine learning system P20 Performing data sanitization and robust learning to defend against misleading in the learning process [48] P21 Ensuring the privacy of data by privacy homomorphism [49]…”
Section: P17mentioning
confidence: 99%
“…In this way even if the attacker get eavesdrop message, it gets only a slice of the information which cannot be constructed to get a complete message. A random key management method as in energy-efficient and privacy-preserving data aggregation algorithm (EEPDA) [42] is utilised or an elliptic curve based method for encryption in queries privacy-preserving mechanism for data ❒ ISSN: 2088-8708 aggregation (QPDA) [43] can also be utilized to overcome eavesdropping attack.…”
Section: Eavesdroppingmentioning
confidence: 99%
“…The performance results show the schemes are low overhead in terms of storage, communication, and computation. Also, the works in [5][6] propose energyefficient clustering schemes that reduce the transmission delay and energy consumption in the network. The schemes either adopt the conventional methods and/or algorithms or hybridize the concepts of conventional algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…For example, in developing query-driven applications in WSN [3], attribute-based naming is necessary to specify the properties of data in a query. However, there is no standard naming scheme for various complex applications in the literature, which limits the deployment of the data-centric approaches in practice for WSNs [4][5][6][7][8][9]. In the meantime, named data networking (NDN) has emerged as a promising field to cope with the usage of today's internet which follows data-centric communication [10] [11].…”
Section: Introductionmentioning
confidence: 99%