Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

被引:1
|
作者
Li, Peng [1 ]
Xu, Chao [1 ]
Xu, He [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
Collection Tree Protocol; Disturbing Data; Network Security; Privacy Protection; Slice Technology; PRESERVING DATA AGGREGATION; LOCATION PRIVACY; SECURE; EFFICIENT;
D O I
10.4018/IJISP.20210101.oa1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.
引用
收藏
页码:190 / 212
页数:23
相关论文
共 50 条
  • [11] The Reliability of Data Protection Algorithm Based on Check Code in Wireless Sensor Networks
    Yi, Chang
    Zhu, Gengming
    Zhang, Dandan
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 260 - 264
  • [12] Data fusion privacy preserving algorithm based on failure nodes in wireless sensor networks
    Sun Z.
    Hou X.
    Li X.
    Hou, Xiaojing, 1600, UK Simulation Society, Clifton Lane, Nottingham, NG11 8NS, United Kingdom (17): : 38.1 - 38.7
  • [13] Privacy Protection Scheme for Data Aggregation in Wireless Sensor Networks Based on PRDA+ Protocol
    Guo, Bohua
    Zhang, Yanwu
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (11) : 40 - 51
  • [14] Privacy Protection for Wireless Medical Sensor Data
    Yi, Xun
    Bouguettaya, Athman
    Georgakopoulos, Dimitrios
    Song, Andy
    Willemson, Jan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) : 369 - 380
  • [15] Location Protection Technology for Wireless Sensor Networks Based on Differential Privacy using DSRNN-MOA
    Nie, Yalin
    Peng, Huiling
    Shi, Nianfeng
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 2625 - 2639
  • [16] Privacy-Preserving and Itinerary-Based Data Aggregation Algorithm in Wireless Sensor Networks
    Wang T.-C.
    Qin X.-L.
    Zhang J.
    Ding Y.-W.
    Chen F.-L.
    Luo Y.-L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (06): : 1334 - 1341
  • [17] A survey on location privacy protection in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Hao
    Guizani, Mohsen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 93 - 114
  • [18] Supporting Business Privacy Protection in Wireless Sensor Networks
    Feng, Nan
    Hao, Zhiqi
    Yang, Sibo
    Wu, Harris
    JOURNAL OF SENSORS, 2016, 2016
  • [19] Location Privacy Protecting based on Anonymous Technology in Wireless Sensor Networks
    Wang, Xiaoyan
    Dong, Lu
    Xu, Chao
    Li, Peng
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 229 - 235
  • [20] An Exact Top-k Query Algorithm with Privacy Protection in Wireless Sensor Networks
    Huang Haiping
    Feng Juan
    Wang Ruchuan
    Qin XiaoLin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,