Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

被引:1
|
作者
Li, Peng [1 ]
Xu, Chao [1 ]
Xu, He [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
Collection Tree Protocol; Disturbing Data; Network Security; Privacy Protection; Slice Technology; PRESERVING DATA AGGREGATION; LOCATION PRIVACY; SECURE; EFFICIENT;
D O I
10.4018/IJISP.20210101.oa1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.
引用
收藏
页码:190 / 212
页数:23
相关论文
共 50 条
  • [1] Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks
    Li, Peng
    Xu, Chao
    Xu, He
    Dong, Lu
    Wang, Ruchuan
    CHINA COMMUNICATIONS, 2019, 16 (05) : 158 - 170
  • [2] Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks
    Peng Li
    Chao Xu
    He Xu
    Lu Dong
    Ruchuan Wang
    中国通信, 2019, 16 (05) : 158 - 170
  • [3] Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data
    Zhang H.
    Li P.
    Journal of Cyber Security and Mobility, 2023, 12 (06): : 845 - 868
  • [4] A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks
    Li, Cheng
    Zhang, Guoyin
    Mao, Yan
    Zhao, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Data aggregation algorithm based on privacy-protection and integrity in wireless sensor networks
    Feng, Juan
    Huang, Haiping
    Zhou, Xuan
    Hu, Kangheng
    Yin, Zhengwei
    Journal of Computational Information Systems, 2014, 10 (20): : 8963 - 8971
  • [6] Privacy protection for wireless sensor networks based on scalable data aggregation
    Computing Center, Northeastern University, Shenyang, China
    不详
    不详
    Sens. Lett., 2 (307-312):
  • [7] Privacy Protection of Node Location and Data in Wireless Sensor Networks
    Huan, He
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 34 - 39
  • [8] Multi-level data fusion algorithm towards privacy protection in wireless sensor networks
    Wang, Zheng
    Li, Liang
    Ao, Chen
    Wu, Dapeng
    Zhou, Wenjun
    Yu, Xiaojun
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 25 (03) : 265 - 283
  • [9] Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection
    Shi, Lusheng
    Li, Kai
    Zhu, Huibo
    JOURNAL OF APPLIED MATHEMATICS, 2023, 2023
  • [10] An Efficient Source Location Privacy Protection Algorithm Based on Circular Trap for Wireless Sensor Networks
    Wang, Yiting
    Liu, Liang
    Gao, Wenzhao
    SYMMETRY-BASEL, 2019, 11 (05):