Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

被引:1
|
作者
Li, Peng [1 ]
Xu, Chao [1 ]
Xu, He [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
Collection Tree Protocol; Disturbing Data; Network Security; Privacy Protection; Slice Technology; PRESERVING DATA AGGREGATION; LOCATION PRIVACY; SECURE; EFFICIENT;
D O I
10.4018/IJISP.20210101.oa1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.
引用
收藏
页码:190 / 212
页数:23
相关论文
共 50 条
  • [41] Data Privacy Protection Solution for Ubiquitous Sensor Networks
    Wang, Jin
    Kim, Ho-Chan
    Tian, Wei
    Ji, Sal
    Kinn, Jeong-Uk
    SENSOR LETTERS, 2013, 11 (02) : 384 - 387
  • [42] Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks
    Wang, Na
    Fu, Junsong
    Li, Jian
    Bhargava, Bharat K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (01) : 100 - 114
  • [43] Data processing based on the privacy-preserving vector for wireless sensor networks
    Zeng, Wei-Ni
    Lin, Ya-Ping
    Yi, Ye-Qing
    He, Shi-Ming
    Chen, Peng
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 34 - 46
  • [44] Redundant coverage in wireless sensor networks
    Fang, Can
    Low, Chor Ping
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3535 - 3540
  • [45] Blockchain based mobile communication data privacy protection algorithm for cellular networks
    Zhang, Lan
    Luo, Yanling
    Zhao, Yue
    Intelligent Decision Technologies, 2024, 18 (04) : 2811 - 2825
  • [46] A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
    Wang, Hao
    Han, Guangjie
    Zhang, Wenbo
    Guizani, Mohsen
    Chan, Sammy
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) : 5917 - 5927
  • [47] Source-location privacy full protection in wireless sensor networks
    Wang, Na
    Fu, Junsong
    Zeng, Jiwen
    Bhargava, Bharat K.
    INFORMATION SCIENCES, 2018, 444 : 105 - 121
  • [48] Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks
    Li, Xinfeng
    Wang, Xiaoyuan
    Zheng, Nan
    Wan, Zhiguo
    Gu, Ming
    2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, : 457 - +
  • [49] Probabilistic receiver-location privacy protection in wireless sensor networks
    Rios, Ruben
    Cuellar, Jorge
    Lopez, Javier
    INFORMATION SCIENCES, 2015, 321 : 205 - 223
  • [50] Data Validation Algorithm for Wireless Sensor Networks
    Ravichandran, Jaichandran
    Arulappan, Anthony Irudhayaraj
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,