Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12938))

Abstract

The reliable and secure data transmission is the essential attribute in Wireless Sensor Networks (WSNs). However, the attackers try to analyze the sensing data in a WSN, which may compromise the security of network. Meanwhile, the message sent by sensor node may be deserted and it can cause a negative effect on data accuracy. Based on the secret sharing and the privacy protection mechanism, we design a novel framework called the Secret-Sharing-based Security Data Aggregation scheme (S\(^3\)DA) in this paper. In S\(^3\)DA, a secret sharing algorithm and a data aggregation scheme are discussed. The former can promote the security and accuracy of sensing data and the latter may reduce the energy consumption in data transmission. The simulation experiments prove the effectiveness and the validity of our proposed framework.

This work was supported in part by the National Natural Science Foundation of China under Grants 61672321, 61832012, 61771289, 61373027 and the Shandong Graduate Education Quality Improvement Plan SDYY17138.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. He, Z., Cai, Z., Cheng, S., Wang, X.: Approximate aggregation for tracking quantiles and range countings in wireless sensor networks. Theoret. Comput. Sci. 607, 381–390 (2015)

    Article  MathSciNet  Google Scholar 

  2. Yu, K., Wang, Y., Yu, J., Yu, D., Cheng, X., Shan, Z.: Localized and distributed link scheduling algorithms in IoT under Rayleigh fading. Comput. Netw. 151, 232–244 (2019)

    Article  Google Scholar 

  3. Sharma, N., Gupta, V.: Meta-heuristic based optimization of WSNs localisation problem-a survey. Procedia Comput. Sci. 173, 36–45 (2020)

    Article  Google Scholar 

  4. Muralitharan, K., Sangwoon, Y., Yoon, M.J.: Enhanced clustering and ACO-based multiple mobile sinks for efficiency improvement of wireless sensor networks. In: Computer Networks, vol. 160, pp. 33–40. Elsevier (2019)

    Google Scholar 

  5. Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968–979 (2020)

    Article  Google Scholar 

  6. Yu, K., Yan, B., Yu, J., Chen, H., Dong, A.: Methods of improving secrecy transmission capacity in wireless random networks. Ad Hoc Netw. 117, 102492 (2021)

    Article  Google Scholar 

  7. Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144–153. IEEE (2019)

    Google Scholar 

  8. Yu, J., et al.: Efficient link scheduling in wireless networks under Rayleigh-fading and multiuser interference. IEEE Trans. Wirel. Commun. 19(8), 5621–5634 (2020)

    Article  Google Scholar 

  9. Cheng, S., Cai, Z., Li, J., Gao, H.: Extracting kernel dataset from big sensory data in wireless sensor networks. IEEE Trans. Knowl. Data Eng. 29(4), 813–827 (2016)

    Article  Google Scholar 

  10. Li, J., Cheng, S., Cai, Z., Yu, J., Wang, C., Li, Y.: Approximate holistic aggregation in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 13(2), 1–24 (2017)

    Article  Google Scholar 

  11. Cheng, S., Cai, Z., Li, J.: Curve query processing in wireless sensor networks. IEEE Trans. Veh. Technol. 64(11), 5198–5209 (2014)

    Article  Google Scholar 

  12. Ilgi, G.S., Ever, Y.K.: Critical analysis of security and privacy challenges for the Internet of drones: a survey. In: Drones in Smart-Cities, pp. 207–214. Elsevier (2020)

    Google Scholar 

  13. Wang, X., Zhou, Q., Cheng, C.T.: A UAV-assisted topology-aware data aggregation protocol in WSN. Phys. Commun. 34, 48–57 (2019)

    Article  Google Scholar 

  14. Tirani, S.P., Avokh, A.: On the performance of sink placement in WSNs considering energy-balanced compressive sensing-based data aggregation. J. Netw. Comput. Appl. 107, 38–55 (2018)

    Article  Google Scholar 

  15. Zhang, J., Hu, P., Xie, F., Long, J., He, A.: An energy efficient and reliable in-network data aggregation scheme for WSN. IEEE Access 6, 71857–71870 (2018)

    Article  Google Scholar 

  16. Padmaja, P., Marutheswar, G.: Energy efficient data aggregation in wireless sensor networks. Mater. Today: Proc. 5(1), 388–396 (2018)

    Google Scholar 

  17. Sharma, N., Bhatt, R.: Privacy preservation in WSN for healthcare application. Procedia Comput. Sci. 132, 1243–1252 (2018)

    Article  Google Scholar 

  18. Zhang, Q., Liu, X., Yu, J., Qi, X.: A trust-based dynamic slicing mechanism for wireless sensor networks. Procedia Comput. Sci. 174, 572–577 (2020)

    Article  Google Scholar 

  19. Kaur, M., Munjal, A.: Data aggregation algorithms for wireless sensor network: a review. Ad Hoc Netw. 100, 102083 (2020)

    Article  Google Scholar 

  20. Zhang, P., Wang, J., Guo, K., Wu, F., Min, G.: Multi-functional secure data aggregation schemes for WSNs. Ad Hoc Netw. 69, 86–99 (2018)

    Article  Google Scholar 

  21. Zhong, H., Shao, L., Cui, J., Xu, Y.: An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. J. Parallel Distrib. Comput. 111, 1–12 (2018)

    Article  Google Scholar 

  22. Hua, P., Liu, X., Yu, J., Dang, N., Zhang, X.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018)

    Article  Google Scholar 

  23. Haseeb, K., Islam, N., Almogren, A., Din, I.U., Almajed, H.N., Guizani, N.: Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7, 79980–79988 (2019)

    Article  Google Scholar 

  24. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: IEEE INFOCOM 2007–26th IEEE International Conference on Computer Communications, pp. 2045–2053. IEEE (2007)

    Google Scholar 

  25. Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34(4), 591–597 (2011)

    Article  MathSciNet  Google Scholar 

  26. Girao, J., Westhoff, D., Schneider, M.: CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: 2005 IEEE International Conference on Communications, ICC 2005, vol. 5, pp. 3044–3049. IEEE (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiaowu Liu or Kan Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, X., Ma, W., Yu, J., Yu, K., Xiang, J. (2021). A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86130-8_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86129-2

  • Online ISBN: 978-3-030-86130-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics