| Literature DB >> 22399893 |
Rabindra Bista1, Jae-Woo Chang.
Abstract
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.Entities:
Keywords: accuracy; eavesdropping; energy efficiency; privacy-preserving data aggregation; wireless sensor networks
Mesh:
Year: 2010 PMID: 22399893 PMCID: PMC3292133 DOI: 10.3390/s100504577
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Classification of the existing PPDA protocols for WSNs.
Figure 2.Message exchange within a cluster in the CPDA for (a) public seed broadcasting (b) customized data encryption & sending (c) assembled information broadcasting
Figure 3.Data aggregation with shadow values.
Figure 4.Aggregation of four-cluster aggregates.
Figure 5.Hierarchical wireless sensor network.
Figure 6.Data slices in SMART.
Figure 7.Two disjoint aggregation trees rooted at a base station.
Figure 8.Data aggregation in CDA.
Figure 9.Two-tiered network model in Sheng and Li’s scheme.
Figure 10.Data aggregation from sensors A, B and C with two aggregators X and Y.
Comparison result of PPDA protocols for WSNs.
| Perturbation | M | H | N | B | M | M | N | Y | H | F | M | M | ||
| H | H | N | B | H | M | N | Y | H | F | M | H | |||
| H | H | N | B | M | M | N | Y | H | F | M | H | |||
| M | M | N | B | L | H | N | Y | L | U | G | M | |||
| Shuffling | H | L | N | B | M | M | N | N | H | F | S | H | ||
| H | M | N | B | H | M | Y | N | H | F | S | H | |||
| Privacy Homomorphism | L | L | N | O | L | L | N | Y | H | F | S | L | ||
| L | L | N | O | L | L | N | N | H | F | M | L | |||
| Perturbation | L | M | N | O | H | H | Y | Y | H | - | G | M | ||
| Hybrid | L | M | N | O | M | M | Y | Y | M | U | S | L | ||
Legend: H = High; M = Medium; L = Low; N = No; Y = Yes; B = Both; O = Outsider; U = Numerous; F = Few; G = Large; S = Small; “-” = Not Mentioned