scholarly journals Privacy Protection Scheme for Data Aggregation in Wireless Sensor Networks Based on PRDA+ Protocol

2018 ◽  
Vol 14 (11) ◽  
pp. 40
Author(s):  
Bohua Guo ◽  
Yanwu Zhang

<p class="0abstract"><span lang="EN-US">To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new scheme is put forward based on the privacy protection of polynomial regression and the privacy protection method based on the homomorphic encryption. The polynomial data aggregation (PRDA+) protocol is also proposed. In this scheme, the node and the base station will pre-deploy a secret key, and the random number generator encrypts the random number for the seed through the private key, which protects the privacy of the data. Then, by comparing the decrypted aggregate data through the correlation between the two metadata, the integrity protection of the data is realized. A weighted average aggregation scheme that can be verified is proposed. In view of the different importance of user information, the corresponding weights are set for each sensor node. EL Gamal digital signature is used to authenticate sensor nodes. The results show that the signature verification algorithm enables the scheme to resist data tampering and data denial, and to trace the source of erroneous data.</span></p>

2021 ◽  
Author(s):  
Jenice Prabu A ◽  
Hevin Rajesh D

Abstract In Wireless sensor network, the major issues are security and energy consumption. There may be several numbers of malicious nodes present in sensor networks. Several techniques have been proposed by the researchers to identify these malicious nodes. WSNs contain many sensor nodes that sense their environment and also transmit their data via multi-hop communication schemes to the base station. These sensor nodes provides power supply using battery and the energy consumption of these batteries must be low. Securing the data is to avoid attacks on these nodes and data communication. The aggregation of data helps to minimize the amount of messages transmitted within the network and thus reduces overall network energy consumption. Moreover, the base station may distinguish the encrypted and aggregated data based on the encryption keys during the decryption of the aggregated data. In this paper, two aspects of the problem is concerned, we investigate the efficiency of data aggregation: first, how to develop cluster-based routing algorithms to achieve the lowest energy consumption for aggregating data, and second, security issues in wsn. By using Network simulator2 (NS2) this scheme is simulated. In the proposed scheme, energy consumption, packet delivery ratio and throughput is analyzed. The proposed clustering, routing, and protection protocol based on the MCSDA algorithm shows significant improvement over the state-of - the-art protocol.


2018 ◽  
Vol 7 (2.27) ◽  
pp. 132
Author(s):  
Avneet Kaur ◽  
Neeraj Sharma

The wireless sensor is deployed to sense large amount of data from the far places. With the large deployment of the sensor networks, it faces major issues like energy consumption, dynamic routing and security. The Energy efficient structure-free data aggregation and delivery (ESDAD) is the protocol which is hierarchal in nature. The ESDAD protocol can be further improved to increase lifetime of wireless sensor networks. The base station localizes the position of each sensor node and defines level of each node for the data transmission. In the ESDAD protocol, the next hop node is selected based on cost function for the data transmission. In this research work, improved in ESDAD protocol is proposed in which gateway nodes are deployed after each level for the data transmission. The sensor node will sense the information and transmit it to gateway node. The gateway node aggregates data to the base station and simulation results show that improved ESDAD protocol performs well in terms of energy consumption and number of throughput. 


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2074 ◽  
Author(s):  
Qiuhua Wang ◽  
Jiacheng Zhan ◽  
Xiaoqin Ouyang ◽  
Yizhi Ren

Wireless Sensor Networks (WSNs) have been widely deployed to monitor valuable objects. In these applications, the sensor node senses the existence of objects and transmitting data packets to the sink node (SN) in a multi hop fashion. The SN is a powerful node with high performance and is used to collect all the information sensed by the sensor nodes. Due to the open nature of the wireless medium, it is easy for an adversary to trace back along the routing path of the packets and get the location of the source node. Once adversaries have got the source node location, they can capture the monitored targets. Thus, it is important to protect the source node location privacy in WSNs. Many methods have been proposed to deal with this source location privacy protection problem, and most of them provide routing path diversity by using phantom node (PN) which is a fake source node used to entice the adversaries away from the actual source node. But in the existing schemes, the PN is determined by the source node via flooding, which not only consumes a lot of communication overhead, but also shortens the safety period of the source node. In view of the above problems, we propose two new grid-based source location privacy protection schemes in WSNs called grid-based single phantom node source location privacy protection scheme (SPS) and grid-based dual phantom node source location privacy protection scheme (DPS) in this paper. Different from the idea of determining the phantom node by the source node in the existing schemes, we propose to use powerful sink node to help the source node to determine the phantom node candidate set (PNCS), from which the source node randomly selects a phantom node acting as a fake source node. We evaluate our schemes through theoretical analysis and experiments. Experimental results show that compared with other schemes, our proposed schemes are more efficient and achieves higher security, as well as keeping lower total energy consumption. Our proposed schemes can protect the location privacy of the source node even in resource-constrained wireless network environments.


Sign in / Sign up

Export Citation Format

Share Document