Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 3956027, 9 pages
https://doi.org/10.1155/2017/3956027
Research Article

Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks

1College of Information Science & Technology, Hainan University, Haikou 570228, China
2State Key Laboratory of Marine Resource Utilization in South China Sea, Haikou 570228, China
3College of Network, Haikou College of Economics, Haikou 571127, China

Correspondence should be addressed to Yong Bai; nc.ude.uniah@iab

Received 30 March 2017; Revised 29 July 2017; Accepted 7 September 2017; Published 16 October 2017

Academic Editor: Xiong Li

Copyright © 2017 Mingshan Xie et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Conti, L. Zhang, S. Roy, R. Di Pietro, S. Jajodia, and L. V. Mancini, “Privacy-preserving robust data aggregation in wireless sensor networks,” Security and Communication Networks, vol. 2, no. 2, pp. 195–213, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. H. E. Wenbo, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, “PDA: privacy-preserving data aggregation in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 2045–2053, Anchorage, AK, USA, May 2007. View at Publisher · View at Google Scholar
  3. W.-B. He, N. Hoang, X. Liu, K. Nahrstedt, and T. Abdelzaher, “iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks,” in Proceedings of the IEEE Military Communications Conference (MILCOM '08), pp. 1–7, San Diego, Calif, USA, November 2008. View at Publisher · View at Google Scholar
  4. W. He, X. Liu, H. Nguyen, and K. Nahrstedt, “A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation,” in Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), pp. 14–19, Montreal, Canada, June 2009. View at Publisher · View at Google Scholar
  5. M. M. Groat, W. Hey, and S. Forrest, “KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks,” in Proceedings of the IEEE INFOCOM 2011, pp. 2024–2032, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Girao, D. Westhoff, and M. Schneider, “CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '05), vol. 5, pp. 3044–3049, IEEE, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient aggregation of encrypted data in wireless sensor networks,” in Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pp. 109–117, IEEE Computer Society, July 2005. View at Publisher · View at Google Scholar
  8. R. Bista, K.-J. Jo, and J.-W. Chang, “A new approach to secure aggregation of private data in wireless sensor networks,” in Proceedings of the 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 394–399, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Bista, K. Hee-Dae, and W. Chang J, “A new private data aggregation scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Computer and Information Technology, Cit 2010, pp. 273–280, Bradford, UK, June 29, 2010.
  10. G. Yang, A.-Q. Wang, Z.-Y. Chen, J. Xu, and H.-Y. Wang, “An energy-saving privacy-preserving data aggregation algorithm,” Chinese Journal of Computers, vol. 34, no. 5, pp. 792–800, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Sen and Y. Geng, “Research on Precision Aggregation Privacy-preserving Algorithm in Wireless Sensor Networks,” Computer Technology and Development, no. 9, pp. 139–142, 2013. View at Google Scholar
  12. S. Lu-sheng and Q. Xiao-lin, “Privacy-preserving data aggregation algorithm with integrity verification,” Computer Science, vol. 40, no. 11, pp. 197–202, 2013. View at Google Scholar
  13. W. Tao-chun, L. Yong-long, and Z. Kai-zhong, “Fault-tolerant and privacy-preserving data aggregation algorithm in sensor networks,” Application Research of Computers, vol. 31, no. 5, pp. 1499–1502, 2014. View at Google Scholar
  14. H. Bah and A. Lev, “k-anonymity based framework for privacy preserving data collection in wireless sensor networks,” Turkish Journal of Electrical Engineering & Computer Sciences, vol. 18, no. 2, pp. 241–271, 2010. View at Google Scholar
  15. C. Zhang, C. Li, and J. Zhang, “A secure privacy-preserving data aggregation model in wearable wireless sensor networks,” Journal of Electrical and Computer Engineering, vol. 2015, Article ID 104286, 9 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. X. Cao, Z. Fu, and X. Sun, “A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing,” Journal of Electrical and Computer Engineering, vol. 2016, Article ID 3219042, 7 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. E. Mlaih and S. A. Aly, “Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks,” in Proceedings of the 2008 IEEE INFOCOM Workshops, pp. 1–6, April 2008. View at Publisher · View at Google Scholar · View at Scopus