首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
An efficient data process technology is needed for wireless sensor networks composed of many sensors with constrained communication, computational, and memory resources. Data aggregation is presented as an efficient and significant method to reduce transmitted data and prolong lifetime for wireless sensor networks. Meanwhile, many applications require preserving privacy for secure data aggregation. In this paper, we propose a high energy‐efficient and privacy‐preserving scheme for secure data aggregation. Because of the importance of communication overhead and accuracy, our scheme achieves less communication overhead and higher data accuracy besides providing for privacy preservation. For extensive simulations, we evaluate and conclude the performance of our high energy‐efficient and privacy‐preserving scheme. The conclusion shows that the high energy‐efficient and privacy‐preserving scheme provides better privacy preservation and is more efficient than existing schemes. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

2.
In wireless sensor networks, data aggregation protocols are used to prolong the network lifetime. However, the problem of how to perform data aggregation while preserving data privacy is challenging. This paper presents a polynomial regression‐based data aggregation protocol that preserves the privacy of sensor data. In the proposed protocol, sensor nodes represent their data as polynomial functions to reduce the amount of data transmission. In order to protect data privacy, sensor nodes secretly send coefficients of the polynomial functions to data aggregators instead of their original data. Data aggregation is performed on the basis of the concealed polynomial coefficients, and the base station is able to extract a good approximation of the network data from the aggregation result. The security analysis and simulation results show that the proposed scheme is able to reduce the amount of data transmission in the network while preserving data privacy. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

3.
Data aggregation is an efficient method to reduce the energy consumption in wireless sensor networks (WSNs). However, data aggregation schemes pose challenges in ensuring data privacy in WSN because traditional encryption schemes cannot support data aggregation. Homomorphic encryption schemes are promising techniques to provide end to end data privacy in WSN. Data reliability is another main issue in WSN due to the errors introduced by communication channels. In this paper, a symmetric additive homomorphic encryption scheme based on Rao‐Nam scheme is proposed to provide data confidentiality during aggregation in WSN. This scheme also possess the capability to correct errors present in the aggregated data. The required security levels can be achieved in the proposed scheme through channel decoding problem by embedding security in encoding matrix and error vector. The error vectors are carefully designed so that the randomness properties are preserved while homomorphically combining the data from different sensor nodes. Extensive cryptanalysis shows that the proposed scheme is secure against all attacks reported against private‐key encryption schemes based on error correcting codes. The performance of the encryption scheme is compared with the related schemes, and the results show that the proposed encryption scheme outperforms the existing schemes.  相似文献   

4.
安全的WSN数据融合隐私保护方案设计   总被引:1,自引:0,他引:1  
针对无线传感器网络数据融合过程中的数据隐私和完整性保护问题,提出一种安全的数据融合隐私保护方案(SPPDA),把节点的私密因子与原始数据构成复数,采用同态加密方法对复数进行加密,实现在密文不解密的情况下进行数据融合,同时采用基于复数的完整性验证方法,确保数据的可靠性。理论分析和仿真结果表明,SPPDA方案的计算代价和通信开销较少,数据融合的精确度高。  相似文献   

5.
This paper proposes a joint data aggregation and encryption scheme using Slepian‐Wolf coding for efficient and secured data transmission in clustered wireless sensor networks (WSNs). We first consider the optimal intra‐cluster rate allocation problem in using Slepian‐Wolf coding for data aggregation, which aims at finding a rate allocation subject to Slepian‐Wolf theorem such that the total energy consumed by all sensor nodes in a cluster for sending encoded data is minimized. Based on the properties of Slepian‐Wolf coding with optimal intra‐cluster rate allocation, a novel encryption mechanism, called spatially selective encryption, is then proposed for data encryption within a single cluster. This encryption mechanism only requires a cluster head to encrypt its data while allowing all its cluster members to send their data without performing any encryption. In this way, the data from all cluster members can be protected as long as the data of the cluster head (called virtual key) is protected. This can significantly reduce the energy consumption for performing data encryption. Furthermore, an energy‐efficient key establishment protocol is also proposed to securely and efficiently establish the key used for encrypting the data of a cluster head. Simulation results show that the joint data aggregation and encryption scheme can significantly improve energy efficiency in data transmission while providing a high level of data security. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

6.
周林  陈扬扬 《电视技术》2012,36(13):71-73
针对分簇网络拓扑结构中簇头节点能量消耗过快,综合考虑了节点的密集程度和剩余能量,采用节点自适应的簇头选择算法,选择部署越集中和剩余能量越大的节点作为簇头节点。同时节点引入了新鲜性信息熵模型,通过比较前后两次接收到的数据的差别程度,设置一个参考阈值来判断是否转发数据。这种数据汇聚算法有效地降低了数据的冗余,减少了能量消耗,增加了带宽利用率,延长了网络的生存期。  相似文献   

7.
In‐network aggregation is crucial in the design of a wireless sensor network (WSN) due to the potential redundancy in the data collected by sensors. Based on the characteristics of sensor data and the requirements of WSN applications, data can be aggregated by using different functions. MAX—MIN aggregation is one such aggregation function that works to extract the maximum and minimum readings among all the sensors in the network or the sensors in a concerned region. MAX—MIN aggregation is a critical operation in many WSN applications. In this paper, we propose an effective mechanism for MAX—MIN aggregation in a WSN, which is called Sensor MAX—MIN Aggregation (SMMA). SMMA aggregates data in an energy‐efficient manner and outputs the accurate aggregate result. We build an analytical model to analyze the performance of SMMA as well as to optimize its parameter settings. Simulation results are used to validate our models and also evaluate the performance of SMMA. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

8.
Energy efficiency is a critical issue in wireless sensor networks(WSNs).In order to minimize energy consumption and balance energy dissipation throughout the whole network,a systematic energy-balanced cooperative transmission scheme in WSNs is proposed in this paper.This scheme studies energy efficiency in systematic view.For three main steps,namely nodes clustering,data aggregation and cooperative transmission,corresponding measures are put forward to save energy.These measures are well designed and tightly coupled to achieve optimal performance.A half-controlled dynamic clustering method is proposed to avoid concentrated distribution of cluster heads caused by selecting cluster heads randomly and to get high spatial correlation between cluster nodes.Based on clusters built,data aggregation,with the adoption of dynamic data compression,is performed by cluster heads to get better use of data correlation.Cooperative multiple input multiple output(CMIMO) with an energy-balanced cooperative cluster heads selection method is proposed to transmit data to sink node.System model of this scheme is also given in this paper.And simulation results show that,compared with other traditional schemes,the proposed scheme can efficiently distribute the energy dissipation evenly throughout the network and achieve higher energy efficiency,which leads to longer network lifetime span.By adopting orthogonal space time block code(STBC),the optimal number of the cooperative transmission nodes varying with the percentage of cluster heads is also concluded,which can help to improve energy efficiency by choosing the optimal number of cooperative nodes and making the most use of CMIMO.  相似文献   

9.
The presence of cluster heads (CHs) in a clustered wireless sensor network (WSN) leads to improved data aggregation and enhanced network lifetime. Thus, the selection of appropriate CHs in WSNs is a challenging task, which needs to be addressed. A multicriterion decision-making approach for the selection of CHs is presented using Pareto-optimal theory and technique for order preference by similarity to ideal solution (TOPSIS) methods. CHs are selected using three criteria including energy, cluster density and distance from the sink. The overall network lifetime in this method with 50% data aggregation after simulations is 81% higher than that of distributed hierarchical agglomerative clustering in similar environment and with same set of parameters. Optimum number of clusters is estimated using TOPSIS technique and found to be 9–11 for effective energy usage in WSNs.  相似文献   

10.
Wireless sensor networks (WSNs) typically consist of a large number of battery‐constrained sensors often deployed in harsh environments with little to no human control, thereby necessitating scalable and energy‐efficient techniques. This paper proposes a scalable and energy‐efficient routing scheme, called WCDS‐DCR, suitable for these WSNs. WCDS‐DCR is a fully distributed, data‐centric, routing technique that makes use of an underlying clustering structure induced by the construction of WCDS (Weakly Connected Dominating Set) to prolong network lifetime. It aims at extending network lifetime through the use of data aggregation (based on the elimination of redundant data packets) by some particular nodes. It also utilizes both the energy availability information and the distances (in number of hops) from sensors to the sink in order to make hop‐by‐hop, energy‐aware, routing decisions. Simulation results show that our solution is scalable, and outperforms existing schemes in terms of network lifetime. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

11.
With the increasing need for different energy saving mechanisms in Wireless Sensor Networks (WSNs), data aggregation techniques for reducing the number of data transmissions by eliminating redundant information have been studied as a significant research problem. These studies have shown that data aggregation in WSNs may produce various trade‐offs among some network related performance metrics such as energy, latency, accuracy, fault‐tolerance and security. In this paper, we investigate the impact of data aggregation on these networking metrics by surveying the existing data aggregation protocols in WSNs. Our aim is twofold: First, providing a comprehensive summary and comparison of the existing data aggregation techniques with respect to different networking metrics. Second, pointing out both the possible future research issues and the need for collaboration between data management and networking research communities working on data aggregation in WSNs. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

12.
In a Wireless Sensor Network (WSN), aggregation exploits the correlation between spatially and temporally proximate sensor data to reduce the total data volume to be transmitted to the sink. Mobile agents (MAs) fit into this paradigm, and data can be aggregated and collected by an MA from different sensor nodes using context specific codes. The MA-based data collection suffers due to large size of a typical WSN and is prone to security problems. In this article, homomorphic encryption in a clustered WSN has been proposed for secure and efficient data collection using MAs. The nodes keep encrypted data that are given to an MA for data aggregation tasks. The MA performs all the data aggregation operations upon encrypted data as it migrates between nodes in a tree-like structure in which the nodes are leafs and the cluster head is the root of the tree. It returns and deposits the encrypted aggregated data to the cluster head after traversing through all the intra cluster nodes over a shortest path route. The homomorphic encryption and aggregation processing in encrypted domain makes the data collection process secure. Simulation results confirm the effectiveness of the proposed secure data aggregation mechanism. In addition to security, MA-based mechanism leads to lesser delay and bandwidth requirements.  相似文献   

13.
A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.  相似文献   

14.
In wireless sensor networks, most data aggregation scheduling methods let all nodes aggregate data in every time instance. It is not energy efficient and practical because of link unreliability and data redundancy. This paper proposes a lossy data aggregation (LDA) scheme to reduce traffic and save energy. LDA selects partial child nodes to sample data at partial time slots and allows estimated aggregation at parent nodes or a root in a network. We firstly consider that all nodes sample data synchronously and find that the error between the real value of a physical parameter and that measured by LDA is bounded respectively with and without link unreliability. Detailed analysis is given on error bound when a confidence level is previously assigned to the root by a newly designed algorithm. Thus, each parent can determine the minimum number of child nodes needed to achieve its assigned confidence level. We then analyze a probability to bound the error with a confidence level previously assigned to the root when all nodes sample data asynchronously. An algorithm then is designed to implement our data aggregation under asynchronization. Finally, we implement our experiment on the basis of real test‐beds to prove that the scheme can save more energy than an existing algorithm for node selection, Distributive Online Greedy (DOG). Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

15.
This paper presents a faulty node detection approach for wireless sensor networks that aggregate measurement data on their way toward the sink (base station). The approach is based on the idea of commanding sensor nodes on the aggregation paths to temporarily stop including their readings in the received aggregated readings from their upstream neighbors. The scheme is dependent on the ability of the sink to detect faulty nodes through changes in the received aggregated readings at the sink using a Markov Chain Controller (MCC). The algorithm that is run in the sink uses the MCC to assign a state to each sensor node based on transitions that are triggered by receiving aggregated path readings, and accordingly deduces the nodes that may be faulty. The experimental results show at least 98% detection rate at the cost of reasonable detection delays and generated wireless network traffic. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

16.
Searchable encryption scheme‐based ciphertext‐policy attribute‐based encryption (CP‐ABE) is a effective scheme for providing multiuser to search over the encrypted data on cloud storage environment. However, most of the existing search schemes lack the privacy protection of the data owner and have higher computation time cost. In this paper, we propose a multiuser access control searchable privacy‐preserving scheme in cloud storage. First, the data owner only encrypts the data file and sets the access control list of multiuser and multiattribute for search data file. And the computing operation, which generates the attribute keys of the users' access control and the keyword index, is given trusted third party to perform for reducing the computation time of the data owner. Second, using CP‐ABE scheme, trusted third party embeds the users' access control attributes into their attribute keys. Only when those embedded attributes satisfy the access control list, the ciphertext can be decrypted accordingly. Finally, when the user searches data file, the keyword trap door is no longer generated by the user, and it is handed to the proxy server to finish. Also, the ciphertext is predecrypted by the proxy sever before the user performs decryption. In this way, the flaw of the client's limited computation resource can be solved. Security analysis results show that this scheme has the data privacy, the privacy of the search process, and the collusion‐resistance attack, and experimental results demonstrate that the proposed scheme can effectively reduce the computation time of the data owner and the users.  相似文献   

17.
In wireless sensor networks, continued operation of battery‐powered devices plays a crucial role particularly in remote deployment. The lifetime of a wireless sensor is primarily dependent upon battery capacity and energy efficiency. In this paper, reduction of the energy consumption of heterogeneous devices with different power and range characteristics is introduced in the context of duty scheduling, dynamic adjustment of transmission ranges, and the effects of IEEE 802.15.4‐based data aggregation routing. Energy consumption in cluster‐based networks is modeled as a mixed‐integer linear and nonlinear programming problem, an NP‐hard problem. The objective function provides a basis by which total energy consumption is reduced. Heuristics are proposed for cluster construction (Average Energy Consumption and the Maximum Number of Source Nodes) and data aggregation routing (Cluster‐based Data Aggregation Routing) such that total energy consumption is minimized. The simulation results demonstrate the effectiveness of balancing cluster size with dynamic transmission range. The heuristics outperform other modified existing algorithms by an average of 15.65% for cluster head assignment, by an average of 22.1% for duty cycle scheduling, and by up to 18.6% for data aggregation routing heuristics. A comparison of dynamic and fixed transmission ranges for IEEE 802.15.4‐based wireless sensor networks is also provided. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

18.
Maximizing the lifespan of wireless sensor networks is currently drawing a lot of attention in the research community. In order to reduce energy consumption, sensor nodes that are far from the base station avoid sending data directly. As a result, several disjoint clusters are formed, and nodes within a cluster send their data through the cluster head to avoid long transmissions. However, several parameters related to transmission cost need to be considered when selecting a cluster head. While most of the existing research work considers energy and distance as the most stringent parameters to reduce energy consumption, these approaches fail to create a fair and balanced cluster. Consequently, unbalanced clusters are formed, resulting in the degradation of overall performance. In this research work, a cluster head selection algorithm is proposed that covers all parts of the sensing area in a balanced manner, saving a significant amount of energy. Furthermore, a capture effect–based intracluster communication mechanism is proposed that efficiently utilizes the time slot under various traffic conditions. A Näive Bayes classifier is used to adapt the window size dynamically according to the traffic pattern. Finally, a simulation model using OMNeT++ is developed to compare the proposed approach with the pioneer clustering approach, LEACH, and the contemporary LEACH‐MAC protocol in terms of performance. The results of the simulation indicate that the proposed approach improves the overall performance in terms of network lifetime, energy efficiency, and throughput.  相似文献   

19.
In an energy‐constrained wireless sensor networks (WSNs), clustering is found to be an effective strategy to minimize the energy depletion of sensor nodes. In clustered WSNs, network is partitioned into set of clusters, each having a coordinator called cluster head (CH), which collects data from its cluster members and forwards it to the base station (BS) via other CHs. Clustered WSNs often suffer from the hot spot problem where CHs closer to the BS die much early because of high energy consumption contributed by the data forwarding load. Such death of nodes results coverage holes in the network very early. In most applications of WSNs, coverage preservation of the target area is a primary measure of quality of service. Considering the energy limitation of sensors, most of the clustering algorithms designed for WSNs focus on energy efficiency while ignoring the coverage requirement. In this paper, we propose a distributed clustering algorithm that uses fuzzy logic to establish a trade‐off between the energy efficiency and coverage requirement. This algorithm considers both energy and coverage parameters during cluster formation to maximize the coverage preservation of target area. Further, to deal with hot spot problem, it forms unequal sized clusters such that more CHs are available closer to BS to share the high data forwarding load. The performance of the proposed clustering algorithm is compared with some of the well‐known existing algorithms under different network scenarios. The simulation results validate the superiority of our algorithm in network lifetime, coverage preservation, and energy efficiency.  相似文献   

20.
In many applications and scenarios, sensors have to regularly report what they monitor from the environment and quickly notify the sink node of event occurrence in the sensing field. An in‐network data reduction technique, such as data aggregation and data compression, can help diminish the amount of data sent from sensors, which not only saves the network bandwidth but also preserves sensors' energy. However, such technique does not consider packet latency because of the aggregation or compression operation. When some sensors generate regular reports in lower data rates, their packets have to spend longer time to be aggregated or compressed, resulting in higher packet delays. Besides, when events occur, the network could suffer from instant congestion due to the generation of numerous event notifications. Motivated with the aforementioned observations, the paper develops a lightweight, latency‐aware routing for data compression (L2DC) scheme to reduce packet latency when applying the compression technique, to reduce the amount of data generated from sensors. L2DC gives event notifications a higher priority over regular reports and eliminates unnecessary notifications to avoid bursty network congestion. In addition, L2DC facilitates the data compression process by allowing each sensor to determine whether to keep packets for compression locally or to send them to a neighbor to be compressed in a distributed manner. Our L2DC scheme can be easily built on most ad hoc and sensor routing protocols because it provides auxiliary redundant packet elimination and relay node selection mechanisms to reduce packet latency. By using the ad hoc on‐demand distance vector protocol as the example, simulation results demonstrate the effectiveness of the L2DC scheme. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号