PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Top Cited Papers
- 1 January 2007
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 2045-2053
- https://doi.org/10.1109/infcom.2007.237
Abstract
Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy-preserving data aggregation schemes for additive aggregation functions. The first scheme -cluster-based private data aggregation (CPDA)-leverages clustering protocol and algebraic properties of polynomials. It has the advantage of incurring less communication overhead. The second scheme -Slice-Mix-AggRegaTe (SMART)-builds on slicing techniques and the associative property of addition. It has the advantage of incurring less computation overhead. The goal of our work is to bridge the gap between collaborative data collection by wireless sensor networks and data privacy. We assess the two schemes by privacy-preservation efficacy, communication overhead, and data aggregation accuracy. We present simulation results of our schemes and compare their performance to a typical data aggregation scheme -TAG, where no data privacy protection is provided. Results show the efficacy and efficiency of our schemes. To the best of our knowledge, this paper is among the first on privacy-preserving data aggregation in wireless sensor networks.Keywords
This publication has 22 references indexed in Scilit:
- CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Deriving private information from randomized dataPublished by Association for Computing Machinery (ACM) ,2005
- Efficient aggregation of encrypted data in wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Resilient aggregation in sensor networksPublished by Association for Computing Machinery (ACM) ,2004
- On the privacy preserving properties of random data perturbation techniquesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Establishing pairwise keys in distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2003
- Cryptographic techniques for privacy-preserving data miningACM SIGKDD Explorations Newsletter, 2002
- Privacy preserving mining of association rulesPublished by Association for Computing Machinery (ACM) ,2002
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- Privacy-preserving data miningACM SIGMOD Record, 2000