Enhanced privacy preserving pattern-code based data aggregation in wireless sensor networks

Bernard Ntirenganya, Zijian Zhang*, Liehuang Zhu, Yu An Tan, Zhen Yang, Cong Guo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In their nature, wireless sensor nodes are resource restrained, such as low power capabilities and small memory. These limitations inevitably affect secure energy-efficient wireless sensor networks protocols in such way that some cryptographic algorithms such as asymmetric algorithms are not convenient to be used in wireless sensor nodes. In this paper, based on perturbation-based efficient confidentiality preserving scheme and Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks scheme, we achieve higher energy-efficiency by using pattern-codes approach to avoid energy wastage due to sending redundant data to cluster-heads. Symmetric cryptographic algorithms such as perturbation algorithm used are more convenient to wireless sensors by providing high data privacy and confidentiality as well.

Original languageEnglish
Title of host publicationProceedings - IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013
Pages336-341
Number of pages6
DOIs
Publication statusPublished - 2013
Event9th IEEE International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013 - Dalian, China
Duration: 11 Dec 201313 Dec 2013

Publication series

NameProceedings - IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013

Conference

Conference9th IEEE International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013
Country/TerritoryChina
CityDalian
Period11/12/1313/12/13

Keywords

  • Energy-efficiency
  • Pattern-codes
  • Privacy-preserving
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Enhanced privacy preserving pattern-code based data aggregation in wireless sensor networks'. Together they form a unique fingerprint.

Cite this