Withdraw
Loading…
iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks
He, Wenbo; Nguyen, Hoang; Liu, Xue; Nahrstedt, Klara; Abdelzaher, Tarek F.
Loading…
Permalink
https://hdl.handle.net/2142/11413
Description
- Title
- iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks
- Author(s)
- He, Wenbo
- Nguyen, Hoang
- Liu, Xue
- Nahrstedt, Klara
- Abdelzaher, Tarek F.
- Issue Date
- 2007-12
- Keyword(s)
- wireless networks
- wireless sensor networks
- Abstract
- Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, how to protect data privacy and data integrity are two major challenges for data aggregation in wireless sensor networks. In this paper, we present iPDA�an integrity-protecting private data aggregation scheme. In iPDA, data privacy is achieved through data slicing and assembling technique; and data integrity is achieved through redundancy by constructing disjoint aggregation paths/trees to collect data of interests. In iPDA, the data integrity-protection and data privacy-preservation mechanisms work synergistically. We evaluate the iPDA scheme in terms of the efficacy of privacy preservation, communication overhead, and data aggregation accuracy, comparing with a typical data aggregation scheme--- TAG, where no integrity protection and privacy preservation is provided. Both theoretical analysis and simulation results show that iPDA achieves the design goals while still maintains the efficiency of data aggregation.
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/11413
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…