Journal on Communications ›› 2018, Vol. 39 ›› Issue (10): 130-142.doi: 10.11959/j.issn.1000-436x.2018101
• Comprehensive Reviews • Previous Articles Next Articles
Xiaoying ZHANG1,2,Hui PENG3,Hong CHEN1,2()
Revised:
2018-04-08
Online:
2018-10-01
Published:
2018-11-23
Supported by:
CLC Number:
Xiaoying ZHANG,Hui PENG,Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks[J]. Journal on Communications, 2018, 39(10): 130-142.
"
隐私保护技术 | 主要优点 | 主要缺点 |
同态加密技术 | 能够直接聚集密文 | 同态加密函数的构造复杂 |
仅支持加法类聚集 | ||
数据扰动技术 | 实现简单 | 扰动的管理复杂 |
切分重组技术 | 隐私性较强 | 通信开销较大 |
容易发生数据碰撞 | ||
泛化技术 | 支持多种聚集类型 | 结果不精确 |
泄露敏感数据的特征信息 | ||
安全多方计算技术 | 结果精确 | 实现依赖于其他参与者 |
匿名技术 | 无需加密 | 通信开销较大 |
存在隐私泄露风险 | ||
前缀成员验证技术 | 隐私保护能力较强 | 仅支持极值聚集 |
通信开销较大 | ||
Z-O编码比较技术 | 隐私性较强 | 仅支持极值聚集 |
通信开销较大 | ||
多项式内插技术 | 隐私性较强 | 多项式计算复杂 |
通信开销较大 | ||
多项式回归技术 | 隐私性较强 | 结果不精确 |
[1] | AKYILDIZ I F , SU W , SANKARASUBRAMANIAM Y ,et al. Wireless sensor networks:a survey[J]. Computer Networks, 2002,38(4): 393-422. |
[2] | SAMUEL M , FRANKLIN M J , HELLERSTEIN J M ,et al. TAG:A tiny aggregation service for ad-hoc sensor networks[J]. OSDI, 2002,36(SI): 131-146. |
[3] | GIR?O J , WESTHOFF D , SCHNEIDER M . CDA:Concealed data aggregation for reverse multicast traffic in wireless sensor networks[J]. ICC, 2005 3044-3049. |
[4] | GOLDREICH O . Foundations of cryptography:a primer[M]. Boston: Now Publishers IncPress, 2005. |
[5] | SHENG B , LI Q . Verifiable privacy-preserving range query in two-tiered sensor networks[J]. INFOCOM, 2008 46-50. |
[6] | SZEWCZYK R , FERENCZ A . Energy implication of network sensor designs[EB]. 2016. |
[7] | RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms[J]. Foundations of secure computation, 1978,4(11): 169-180. |
[8] | WESTHOFF D , GIR?O J , ACHARYA M . Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J]. IEEE Trans.Mob.Comput, 2006,5(10): 1417-1431. |
[9] | DOMINGO-FERRER J , . A provably secure additive and multiplicative privacy homomorphism[C]// ISC. 2002: 471-483. |
[10] | SICARI S , GRIECO L A , BOGGIA G ,et al. DyDAP:a dynamic data aggregation scheme for privacy aware wireless sensor networks[J]. Journal of Systems and Software, 2012,85(1): 152-166. |
[11] | MASTROCRISTINO T , TESORIERE G , GRIECO L A ,et al. Congestion control based on data-aggregation for wireless sensor networks[C]// International Symposium on Industrial Electronics. 2010: 3386-3391. |
[12] | CASTELLUCCIA C , MYKLETUN E , TSUDIK G ,et al. Efficient aggregation of encrypted data in wireless sensor networks[C]// MobiQuitous. 2005: 109-117. |
[13] | VERNAM G S . Cipher printing telegraph systems for secret wire and radio telegraphic communications[J]. Transactions of the American In stitute of Electrical Engineers, 1926,45(2): 295-301. |
[14] | CRISTOFARO E D , . A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks[C]// WOWMOM. 2007: 1-5. |
[15] | CHAN H , PERRIG A , SONG D . Secure hierarchical in-network aggregation in sensor networks[C]. ACM Conference on Computer and Communications Security, 2006: 278-287. |
[16] | CASTELLUCCIA C , CHAN A , MYKLETUN E ,et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks[J]. TOSN, 2009,5(3):20: 1-20. |
[17] | PRZYDATEK B , SONG D , PERRIG A . SIA:secure information aggregation in sensor networks[C]// SenSys. 2003: 255-265. |
[18] | CHAN H , PERRIG A , PRZYDATEK B ,et al. SIA:secure information aggregation in sensor networks[J]. Journal of Computer Security, 2007,15(1): 69-102. |
[19] | YANG Y , WANG X , ZHU S ,et al. SDAP:A secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Trans.Inf.Syst.Secur., 2008,11(4): 18:1-18:43. |
[20] | ISKANDER M K , LEE A J . Privacy and robustness for data aggregation in wireless sensor networks[C]// ACM Conference on Computer and Communications Security. 2010: 699-701. |
[21] | GOBRIEL S , KHATTAB S , MOSSé D .et al. RideSharing:fault tolerant aggregation in sensor networks using corrective actions[C]// SECON. 2006: 595-604. |
[22] | OZDEMIR S , XIAO Y . Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011,55(8): 1735-1746. |
[23] | DAN B , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts[C]// TCC. 2005: 325-341. |
[24] | PAPADOPOULOS S , KIAYIAS A , PAPADIAS D . Secure and efficient in-network processing of exact SUM queries[C]// ICDE. 2011: 517-528. |
[25] | MENEZES A J , OORSCHOT P V , VANSTONE S A . Handbook of applied cryptography[M]. Florida: CRC PressPress, 1996. |
[26] | PERRIG A , SZEWCZYK R , WEN V ,et al. SPINS:Security Protocols for Sensor Networks[J]. Wireless Networks, 2002,8(5): 521-534. |
[27] | KUMAR V , MADRIA S K . Secure hierarchical data aggregation in wireless sensor networks:performance evaluation and analysis[C]// MDM. 2012: 196-201. |
[28] | MYKLETUN E , GIR?O J , WESTHOFF D . Public key based crypto schemes for data concealment in wireless sensor networks[C]// ICC. 2006: 2288-2295. |
[29] | SUN H M , LIN Y H , HSIAO Y C ,et al. An efficient and verifiable concealed data aggregation scheme in wireless sensor networks[C]// ICESS. 2008: 19-26. |
[30] | ZHOU Q , YANG G , HE L . An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks[J]. IJDSN, 2014(7): 962-925. |
[31] | CHAN C F , . Symmetric-key homomorphic encryption for encrypted data processing[C]// ICC. 2009: 1-5. |
[32] | AGRAWAL S , DAN B . Homomorphic MACs:MAC-based integrity for network coding[C]// ACNS, 2009: 292-305. |
[33] | MERAD B O R , SENOUCI S M , FEHAM M . Secure and efficient verification for data aggregation in wireless sensor networks[J]. Journal of Network Management, 2018(28).:e2000 |
[34] | SHIM K A , PARK C M . A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks[J]. IEEE Trans.Parallel Distrib.Syst, 2015,26(8): 2128-2139. |
[35] | ARA A , AL-RODHAAN M , YUAN T ,et al. A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems[J]. IEEE Access, 2017(5): 12601-12617. |
[36] | ZHU H , GAO L , LI H . Secure and privacy-preserving body sensor data collection and query scheme[J]. Sensors, 2016,16(2):179. |
[37] | XIE K , NING X , WANG X ,et al. An efficient privacy-preserving compressive data gathering scheme in WSNs[J]. Inf.Sci. 2017(390): 82-94. |
[38] | TONYALI S , AKKAYA K , SAPUTRO N ,et al. Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems[J]. Future Generation Comp.Syst, 2018(78): 547-557. |
[39] | ZHANG L , WANG X , LU J ,et al. An efficient privacy preserving data aggregation approach for mobile sensing[J]. Security and Communication, 2016,9(16): 3844-3853 |
[40] | CHEN C M , LIN Y H , LIN Y C ,et al. RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Trans.Parallel Distrib.Syst., 2012,23(4): 727-734. |
[41] | ZHANG K , HAN Q , CAI Z ,et al. RiPPAS:a ring-based privacy-preserving aggregation scheme in wireless sensor networks[J]. Sensors, 2017,17(2):300. |
[42] | ZHONG H , SHAO L , CUI J ,et al. An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks[J]. J.Parallel Distrib.Comput, 2018(111): 1-12. |
[43] | ZHANG P , WANG J , GUO K ,et al. Multi-functional secure data aggregation schemes for WSNs[J]. Ad Hoc Networks, 2018(69): 86-99. |
[44] | ADAM N R , WORTMANN J C . Security-control methods for statistical databases:a comparative study[C]// ACM Comput.Surv. 1989,21(4): 515-556. |
[45] | XIAO X , TAO Y , CHEN M . Optimal Random perturbation at multiple privacy levels[J]. PVLDB, 2009,2(1): 814-825. |
[46] | HE W , LIU X , NGUYEN H ,et al. PDA:privacy-preserving data aggregation in wireless sensor networks[C]// INFOCOM. 2007: 2045-2053. |
[47] | HE W , LIU X , NGUYEN H ,et al. PDA:privacy-preserving data aggregation for information collection[J]. TOSN, 2011,8(1): 6:1-6:22. |
[48] | FENG T , WANG C , ZHANG W ,et al. Confidentiality protection for distributed sensor data aggregation[C]// INFOCOM, 2008: 56-60. |
[49] | LIN X , LU R , SHEN X . MDPA:multidimensional privacy-preserving aggregation scheme for wireless sensor networks[J]. Communications and Mobile Computing, 2010,10(6): 843-856. |
[50] | YAO Y , LIU J , XIONG N N . Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes[J]. Sensors, 2014,14(11): 21174-21194. |
[51] | HAI V , NGUYEN T , MITTAL N ,et al. PEQ:a privacy-preserving scheme for exact query evaluation in distributed sensor data networks[C]// SRDS. 2009: 189-198. |
[52] | LI H , LIN K , LI K . Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks[J]. Computer Communications, 2011,34(4): 591-597. |
[53] | LI C , LIU Y . ESMART:energy-efficient slice-mix-aggregate for wireless sensor network[J]. IJDSN, 2013 |
[54] | LIU C , LIU Y , ZHANG Z ,et al. High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks[J]. International Journal of Communication Systems, 2013,26(3): 380-394. |
[55] | 王涛春, 秦小麟, 刘亮 ,等. 无线传感器网络中安全高效的空间数据聚集算法[J]. 软件学报, 2014,25(8): 1671-1684. |
WANG T C , QIN X L , LIU L ,et al. Secure and Energy-Efficient Spatial Data Aggregation Algorithm in Wireless Sensor Networks[J]. Journal of Software, 2014,25(8): 1671-1684. | |
[56] | 杨庚, 王安琪, 陈正宇 ,等. 一种低耗能的数据融合隐私保护算法[J]. 计算机学报, 2011,34(5): 792-800. |
YANG G , WANG A Q , CHEN Z D ,et al. An Energy-Saving Privacy-Preserving Data Aggregation Algorithm[J]. Chinese Journal of Computers, 2011,34(5): 792-800 | |
[57] | ZHANG C , LI C , ZHAO Y . A balance privacy-preserving data aggregation model in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2015,501:937280. |
[58] | WANG J , CHEN Y . Research and improvement of wireless sensor network secure data aggregation protocol based on SMART[J]. International Journal of Wireless Information Networks, 2018(11): 1-9. |
[59] | 杨庚, 李森, 陈正宇 ,等. 传感器网络中面向隐私保护的高精确度数据融合算法[J]. 计算机学报, 2013,36(1): 189-200. |
YANG G , LI S , CHEN ZY ,et al. High-Accuracy and Privacy-Preserving Oriented Data Aggregation Algorithm in Sensor Networks[J]. Chinese Journal of Computers, 2013,36(1): 189-200 | |
[60] | YANG G , LI S , XU X ,et al. Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks[J]. IJDSN, 2013. |
[61] | XU Y , LEE W , XU J ,et al. Processing window queries in wireless sensor networks[C]// ICDE. 2006: 70-70. |
[62] | SHI J , ZHANG R , LIU Y ,et al. PriSense:privacy-preserving data aggregation in people-centric urban sensing systems[J]. INFOCOM, 2010: 758-766. |
[63] | HE W , NGUYEN H , LIU X ,et al. iPDA:an integrity-protecting private data aggregation scheme for wireless sensor networks[C]// MILCOM. 2008: 1-7. |
[64] | HE W , LIU X , NGUYEN H ,et al. A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]// ICDCS Workshops. 2009: 14-19. |
[65] | WANG T , QIN X , DING Y ,et al. Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J]. Wireless Personal Communications, 2019,8(1): 665-684. |
[66] | HASAN ?AM , SUAT ?ZDEMIR , PRASHANT NAIR , et al ,et al. Energy-efficient secure pattern based data aggregation for wireless sensor networks[J]. Computer Communications, 2006,29(4): 446-455. |
[67] | ZHANG W , WANG C , FENG T . GP2S:Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data[C]// PerCom. 2008: 179-184. |
[68] | WANG C , WANG G , ZHANG W ,et al. Reconciling privacy preservation and intrusion detection in sensory data aggregation[C]// INFOCOM. 2011: 336-340. |
[69] | 范永健, 陈红, 张晓莹 ,等. 无线传感器网络中隐私保护通用近似查询协议[J]. 计算机学报, 2014,37(4): 915-926. |
FAN YJ , CHEN H , ZHANG XY ,et al. Privacy-Preserving Generic Approximate Query in Wireless Sensor Networks[J]. Chinese Journal of Computers, 2014,37(4): 915-926 | |
[70] | SCHNEIER B P . Applied cryptography - protocols,algorithms,and source code in C[M]. 2nd ed,New Jersey: Wiley, 1996. |
[71] | CONTI M , ZHANG L , ROY S ,et al. Privacy-preserving robust data aggregation in wireless sensor networks[J]. Security and Communication Networks, 2009,2(2): 195-213. |
[72] | CHOI H , ZHU S , PORTA T F L . SET:Detecting node clones in sensor networks[C]// SecureComm. 2007: 341-350. |
[73] | ZHANG X , CHEN H , WANG K ,et al. Rotation-based privacy-preserving data aggregation in wireless sensor networks[C]// ICC, 2014: 4184-4189. |
[74] | RAGHUNATHAN B . The complete book of data anonymization:from planning to implementation[M]. Florida: CRC PressPress, 2013. |
[75] | GROAT M M , HE W , FORREST S . KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]// INFOCOM. 2011: 2024-2032. |
[76] | WU D , YANG B , WANG H ,et al. Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks[J]. TOMCCAP, 2016,12(4s): 60:1-60:19. |
[77] | CHENG J , YANG H , WONG S H Y ,et al. Design and implementation of cross-domain cooperative firewall[J]. ICNP, 2007: 284-293. |
[78] | LIU A X , CHEN F . Collaborative enforcement of firewall policies in virtual private networks[C]// PODC. 2008: 95-104. |
[79] | YAO Y , XIONG X , PARK Y H ,et al. Privacy-preserving max/min query in two-tiered wireless sensor networks[J]. Computers & Mathematics with Applications, 2013,65(9): 1318-1325. |
[80] | KUMAR V , MADRIA S . PIP:privacy and integrity preserving data aggregation in wireless sensor networks[C]// SRDS. 2013: 10-19. |
[81] | PARAKH A , KAK S . Recursive secret sharing for distributed storage and information hiding[C]// ANTS. 2009: 1-3. |
[82] | OZDEMIR S , PENG M , XIAO Y . PRDA:polynomial regression-based privacy-preserving data aggregation for wireless sensor network[J]. Communications and Mobile Computing, 2015,15(4):(2015) 615-628. |
[83] | DAI H , YANG G , QIN X . EMQP:An energy-efficient privacy-preserving MAX/MIN query processing in tiered wireless sensor networks[J]. IJDSN, 2013 |
[84] | LIN H Y , TZENG W G . An efficient solution to the millionaires' problem based on homomorphic encryption[C]// ACNS. 2005: 456-466. |
[85] | DAI H , WEI T , HUANG Y ,et al. Random secure comparator selection based privacy-preserving max/min query processing in two-tiered sensor networks[J]. Sensors, 2016: 6301404:1-6301404:13. |
[86] | ALGHAMDI W Y , WU H , KANHERE S S . Reliable and secure end-to-end data aggregation using secret sharing in WSNs[C]// IEEE Wireless Communications and Networking Conference. 2017: 1-6. |
[87] | MAHIMKAR A , RAPPAPORT T S . SecureDAV:a secure data aggregation and verification protocol for sensor networks[C]// GLOBECOM. 2004: 2175-2179. |
[88] | YU L , LI J , CHENG S ,et al. Secure continuous aggregation via sampling-based verification in wireless sensor networks[C]// INFOCOM. 2011: 1763-1771. |
[89] | YU L , LI J , CHENG S ,et al. Secure continuous aggregation in wireless sensor networks[J]. IEEE Trans.Parallel Distrib.Syst., 2014,25(3): 762-774. |
[1] | Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG. GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents [J]. Journal on Communications, 2023, 44(6): 183-197. |
[2] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[3] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[4] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[5] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
[6] | Haili SUN, Xiang LONG, Lansheng HAN, Yan HUANG, Qingbo LI. Overview of anomaly detection techniques for industrial Internet of things [J]. Journal on Communications, 2022, 43(3): 196-210. |
[7] | Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130. |
[8] | Pingzhi FAN, Li LI, Huan CHEN, Gaofeng CHENG, Linjie YANG, Xiaobo TANG. Random access for massive Internet of things:current status, challenges and opportunities [J]. Journal on Communications, 2021, 42(4): 1-21. |
[9] | Hui TIAN, Hao WU, Yang TIAN, Jianyang REN, Yajuan CUI, Wenbao AI, Jianhua YUAN. Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things [J]. Journal on Communications, 2021, 42(4): 89-99. |
[10] | Zhengyu ZHU, Jinlei XU, Gangcan SUN, Ning WANG, Wanming HAO. Secure beamforming design for IRS-assisted SWIPT Internet of things system [J]. Journal on Communications, 2021, 42(4): 185-193. |
[11] | Wanming HAO, Jinkun XIE, Gangcan SUN, Zhengyu ZHU, Yiqing ZHOU. Robust chance-constrained optimization algorithm design for secure wireless powered backscatter communication system [J]. Journal on Communications, 2021, 42(3): 100-110. |
[12] | Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm [J]. Journal on Communications, 2021, 42(3): 135-149. |
[13] | Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU. Edge computing privacy protection method based on blockchain and federated learning [J]. Journal on Communications, 2021, 42(11): 28-40. |
[14] | Chuanhong LIU, Caili GUO, Yang YANG, Chunyan FENG, Qizheng SUN, Jiujiu CHEN. Intelligent task-oriented semantic communication method in artificial intelligence of things [J]. Journal on Communications, 2021, 42(11): 97-108. |
[15] | Liang YUAN, Xiao YU, Enjie DING, Xiaohu ZHAO, Shimin FENG, Da ZHANG, Tongyu LIU, Weidong WANG, Yanqiu HUANG. Research on key technologies of human-machine-environment states perception in mine Internet of things [J]. Journal on Communications, 2020, 41(2): 1-12. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|