A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
SIA: Secure information aggregation in sensor networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Hi-index | 0.00 |
Privacy is an important issue in today's context of extreme penetration of Internet and mobile technologies. Recently, large-scale data collection and integration efforts increased privacy concerns. It becomes very challenging to ensure the protection of user's private data. In this paper, we address this issue from a practical deployment point of view. We have considered a non hierarchical or flat wireless sensor network, where there are several sensor/sink nodes reporting to a query server and the server aggregates the data sent by the sink nodes, while preserving the privacy of the data. The philosophy of this work is that the server nodes cannot be able to find out the content of the data of the sink nodes. It can only perform the aggregation operation and execute further processing on the aggregated data only. The scheme presented in this paper has the advantages of low computation time even in the presence of large number of sink nodes. The proposed scheme unlike many other published schemes is highly scalable [3, 10]. We demonstrate through simulation results the efficacy of our scheme in terms of privacy disclosure probability and computational efficiency.