Files in this item

FilesDescriptionFormat

application/pdf

application/pdfiPDA An Integri ... reless Sensor Networks.pdf (200kB)
(no description provided)PDF

Description

Title:iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks
Author(s):He, Wenbo; Nguyen, Hoang; Liu, Xue; Nahrstedt, Klara; Abdelzaher, Tarek F.
Subject(s):wireless networks
wireless sensor networks
Abstract:Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, how to protect data privacy and data integrity are two major challenges for data aggregation in wireless sensor networks. In this paper, we present iPDA�an integrity-protecting private data aggregation scheme. In iPDA, data privacy is achieved through data slicing and assembling technique; and data integrity is achieved through redundancy by constructing disjoint aggregation paths/trees to collect data of interests. In iPDA, the data integrity-protection and data privacy-preservation mechanisms work synergistically. We evaluate the iPDA scheme in terms of the efficacy of privacy preservation, communication overhead, and data aggregation accuracy, comparing with a typical data aggregation scheme--- TAG, where no integrity protection and privacy preservation is provided. Both theoretical analysis and simulation results show that iPDA achieves the design goals while still maintains the efficiency of data aggregation.
Issue Date:2007-12
Genre:Technical Report
Type:Text
URI:http://hdl.handle.net/2142/11413
Other Identifier(s):UIUCDCS-R-2007-2923
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-22


This item appears in the following Collection(s)

Item Statistics