Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
SPINS: security protocols for sensor networks
Wireless Networks
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Event-to-sink reliable transport in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
IEEE Transactions on Mobile Computing
A survey on wireless multimedia sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
IEEE Transactions on Mobile Computing
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Feedback-based control for providing real-time services with the 802.11e MAC
IEEE/ACM Transactions on Networking (TON)
Reliable bursty convergecast in wireless sensor networks
Computer Communications
SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Nanonetworks: A new communication paradigm
Computer Networks: The International Journal of Computer and Telecommunications Networking
n-LDA: n-Layers Data Aggregation in Sensor Networks
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy-efficient secure pattern based data aggregation for wireless sensor networks
Computer Communications
A conceptual model for privacy policies
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Secure Wireless Multimedia Sensor Networks: A Survey
UBICOMM '09 Proceedings of the 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
Dealing with anonymity in wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Secure and reliable data aggregation for wireless sensor networks
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Node clustering in wireless sensor networks: recent developments and deployment challenges
IEEE Network: The Magazine of Global Internetworking
DARE: evaluating Data Accuracy using node REputation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
End-to-end data aggregation, without degrading sensing accuracy, is a very relevant issue in wireless sensor networks (WSN) that can prevent network congestion to occur. Moreover, privacy management requires that anonymity and data integrity are preserved in such networks. Unfortunately, no integrated solutions have been proposed so far, able to tackle both issues in a unified and general environment. To bridge this gap, in this paper we present an approach for dynamic secure end-to-end data aggregation with privacy function, named DyDAP. It has been designed starting from a UML model that encompasses the most important building blocks of a privacy-aware WSN, including aggregation policies. Furthermore, it introduces an original aggregation algorithm that, using a discrete-time control loop, is able to dynamically handle in-network data fusion to reduce the communication load. The performance of the proposed scheme has been verified using computer simulations, showing that DyDAP avoids network congestion and therefore improves WSN estimation accuracy while, at the same time, guaranteeing anonymity and data integrity.