Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

被引:1
|
作者
Li, Peng [1 ]
Xu, Chao [1 ]
Xu, He [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
Collection Tree Protocol; Disturbing Data; Network Security; Privacy Protection; Slice Technology; PRESERVING DATA AGGREGATION; LOCATION PRIVACY; SECURE; EFFICIENT;
D O I
10.4018/IJISP.20210101.oa1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.
引用
收藏
页码:190 / 212
页数:23
相关论文
共 50 条
  • [21] High accuracy data fusion algorithm for privacy serving in wireless sensor networks
    Li, Yan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (04) : 4633 - 4638
  • [22] Deep Mining of Redundant Data in Wireless Sensor Network Based on Genetic Algorithm
    Diao H.
    Automatic Control and Computer Sciences, 2018, 52 (4) : 291 - 296
  • [23] Modulation and data encryption technology of RSSI algorithm for wireless sensor networks
    Wang, Wei
    Wang, Zhaoba
    Journal of Information and Computational Science, 2015, 12 (07): : 2901 - 2909
  • [24] Node Location Privacy Protection in Unattended Wireless Sensor Networks
    Zhou, ZhiGang
    Wang, Yu
    Li, PanPan
    Chang, XinGong
    Luo, JiWei
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [25] A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
    Li, Xiong
    Niu, Jianwei
    Choo, Kim-Kwang Raymond
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 30 - 44
  • [26] A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks
    Ying, Bidi
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [27] Privacy protection mechanisms for hybrid hierarchical wireless sensor networks
    Mitseva, Anelia
    Gerlach, Matthias
    Prasad, Neeli R.
    2007 FOURTH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 509 - 513
  • [28] Research on Data Aggregation Technology Based on Wireless Sensor Networks
    Wang, Tianming
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 127 - 134
  • [29] Research on Wireless Sensor Networks Based on Data Acquisition Technology
    Wei, Ling
    Guo, Yanting
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 482 - 486
  • [30] Privacy Protection Algorithm Based on Expected Phantom Source Node in Wireless Sensor Network
    Bai, Leqiang
    Li, Ling
    Qian, Shiguang
    Zhang, Shihong
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 985 - 988