Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2015, Article ID 104286, 9 pages
http://dx.doi.org/10.1155/2015/104286
Research Article

A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks

Science School, Beijing University of Civil Engineering and Architecture, Beijing 100044, China

Received 29 June 2015; Accepted 13 September 2015

Academic Editor: Jiang Zhu

Copyright © 2015 Changlun Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. C. J. Deepu and Y. Lian, “A Joint QRS detection and data compression scheme for wearable sensors,” IEEE Transactions on Biomedical Engineering, vol. 62, no. 1, pp. 165–175, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. P. Picazo-Sanchez, J. E. Tapiador, P. Peris-Lopez, and G. Suarez-Tangi, “Secure publish-subscribe protocols for heterogeneous medical wireless body area networks,” Sensors (Switzerland), vol. 14, no. 12, pp. 22619–22642, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Di Pietro, P. Michiardi, and R. Molva, “Confidentiality and integrity for data aggregation in WSN using peer monitoring,” Security & Communication Networks, vol. 2, no. 2, pp. 181–194, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Zambrano, F. Derogarian, R. Dias et al., “A wearable sensor network for human locomotion data capture,” in pHealth, vol. 177 of Studies in Health Technology and Informatics, pp. 216–223, IOS Press, Amsterdam, The Netherlands, 2012. View at Publisher · View at Google Scholar
  6. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient aggregation of encrypted data in wireless sensor networks,” in Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems—Networking and Services (MobiQuitous '05), pp. 109–117, New York, NY, USA, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Girao, D. Westhoff, and M. Schneider, “CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '05), pp. 3044–3049, May 2005. View at Scopus
  8. T. Feng, C. Wang, W. Zhang, and L. Ruan, “Confidentiality protection for distributed sensor data aggregation,” in Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM '08), pp. 56–60, IEEE, Phoenix, Ariz, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-dnf formulas on ciphertexts,” in Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings, Lecture Notes in Computer Science, pp. 325–341, 2005. View at Publisher · View at Google Scholar
  10. E. Mykletun, J. Girao, and D. Westhoff, “Public key based cryptoschemes for data concealment in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '06), vol. 5, pp. 2288–2295, Istanbul, Turkey, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Girao, D. Westhoff, E. Mykletun, and T. Araki, “TinyPEDS: tiny persistent encrypted data storage in asynchronous wireless sensor networks,” Ad Hoc Networks, vol. 5, no. 7, pp. 1073–1089, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. J. M. Bahi, C. Guyeux, and A. Makhoul, “Efficient and robust secure aggregation of encrypted data in sensor networks,” in Proceedings of 4th International Conference on Sensor Technologies and Applications (SENSORCOMM '10), pp. 472–477, Venice, Italy, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Ozdemir and Y. Xiao, “Integrity protecting hierarchical concealed data aggregation for wireless sensor networks,” Computer Networks, vol. 55, no. 8, pp. 1735–1746, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. Y.-H. Lin, S.-Y. Chang, and H.-M. Sun, “CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 7, pp. 1471–1483, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. Q. Zhou, G. Yang, and L. He, “A secure-enhanced data aggregation based on ECC in wireless sensor networks,” Sensors, vol. 14, no. 4, pp. 6701–6721, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, 2004. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Lindsey and C. S. Raghavendra, “PEGASIS: power-efficient gathering in sensor information systems,” in Proceedings of the EEE Aerospace Conference, vol. 3, pp. 1125–1130, IEEE, Big Sky, Mont, USA, March 2002. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Rebahi, V. E. Mujica-V, and D. Sisalem, “A reputation-based trust mechanism for ad hoc networks,” in Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC '05), pp. 37–42, Cartagena, Spain, June 2005. View at Scopus
  19. L. I. Yong-Jun, “Research on trust mechanism for peer-to-peer network,” Chinese Journal of Computers, vol. 40, no. 5, pp. 805–809, 2010. View at Google Scholar
  20. S. Madden, M. J. Franklin, and J. M. Hellerstein, “TAG: a tiny aggregation service for ad-hoc sensor networks,” in Proceedings of the 5th Usenix Symposium on Operating Sysems Design & Implementation (OSDI '02), vol. 3, pp. 131–146, Boston, Mass, USA, December 2002.
  21. L. Eschenauer and V. D. Gligo, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), pp. 41–47, Washington, DC, USA, November 2002. View at Publisher · View at Google Scholar
  22. W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, “PDA: privacy-preserving data aggregation in wireless sensor networks,” in Proceedings of the 26th IEEE Conference on Computer Communications, pp. 2045–2053, Anchorage, Alaska, USA, May 2007. View at Publisher · View at Google Scholar