Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

被引:1
|
作者
Li, Peng [1 ]
Xu, Chao [1 ]
Xu, He [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
Collection Tree Protocol; Disturbing Data; Network Security; Privacy Protection; Slice Technology; PRESERVING DATA AGGREGATION; LOCATION PRIVACY; SECURE; EFFICIENT;
D O I
10.4018/IJISP.20210101.oa1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.
引用
收藏
页码:190 / 212
页数:23
相关论文
共 50 条
  • [31] Mobility based Data Collection Algorithm for Wireless Sensor Networks
    Wang, Jin
    Zuo, Liwu
    Zhang, Zhongqi
    Xia, Feng
    Kim, Jeong-Uk
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 342 - 347
  • [32] A Clustering Based Data Integration Algorithm in Wireless Sensor Networks
    Huang, Jing
    Li, Haihua
    Yang, Rui
    Che, Haiyan
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 552 - +
  • [33] Data aggregation algorithm based on clustering for wireless sensor networks
    Zhai, Shuang
    Yang, Xinyu
    Li, Shuzhuang
    Guo, Xingang
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2022, 122 (01): : 475 - 484
  • [34] Priority based data reporting algorithm in wireless sensor networks
    Zeng B.
    Yao L.
    Hu W.
    Journal of Shanghai Jiaotong University (Science), 2017, 22 (1) : 60 - 65
  • [35] Data aggregation algorithm based on clustering for wireless sensor networks
    Shuang Zhai
    Xinyu Yang
    Shuzhuang Li
    Xingang Guo
    The International Journal of Advanced Manufacturing Technology, 2022, 122 : 475 - 484
  • [36] Priority Based Data Reporting Algorithm in Wireless Sensor Networks
    曾斌
    姚路
    胡炜
    Journal of Shanghai Jiaotong University(Science), 2017, 22 (01) : 60 - 65
  • [37] Privacy and Robustness for Data Aggregation in Wireless Sensor Networks
    Iskander, Marian K.
    Lee, Adam J.
    Mosse, Daniel
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 699 - 701
  • [38] DynaPro: Dynamic Wireless Sensor Network Data Protection Algorithm in IoT via Differential Privacy
    Li, Songyan
    Liu, Zhaobin
    Huang, Zhiyi
    Lyu, Haoze
    Li, Zhiyang
    Liu, Weijiang
    IEEE ACCESS, 2019, 7 : 167754 - 167765
  • [39] Location privacy protection for wireless sensor networks based on fan-shaped region
    Li, Feng-Yun
    Li, Pei-Yu
    Gao, Fu-Xiang
    Chang, Gui-Ran
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2013, 34 (01): : 21 - 24
  • [40] Routing-Based Source-Location Privacy Protection in Wireless Sensor Networks
    Li, Yun
    Lightfoot, Leron
    Ren, Jian
    2009 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2009, : 27 - 32