Next Article in Journal
Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO
Next Article in Special Issue
Efficient Data Collection in Widely Distributed Wireless Sensor Networks with Time Window and Precedence Constraints
Previous Article in Journal
Augmented Reality Tool for the Situational Awareness Improvement of UAV Operators
Previous Article in Special Issue
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks

1
College of Computer Science & Technology, Harbin Engineering University, Harbin 150001, China
2
Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(2), 300; https://doi.org/10.3390/s17020300
Submission received: 28 October 2016 / Revised: 16 January 2017 / Accepted: 26 January 2017 / Published: 7 February 2017

Abstract

:
Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users’ queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring structure to perform aggregation. It uses pseudonym mechanism for anonymous communication and uses homomorphic encryption technique to add noise to the data easily to be disclosed. RiPPAS can handle both s u m ( ) queries and m i n ( ) / m a x ( ) queries, while the existing privacy-preserving aggregation methods can only deal with s u m ( ) queries. For processing s u m ( ) queries, compared with the existing methods, RiPPAS has advantages in the aspects of privacy preservation and communication efficiency, which can be proved by theoretical analysis and simulation results. For processing m i n ( ) / m a x ( ) queries, RiPPAS provides effective privacy preservation and has low communication overhead.

1. Introduction

A Wireless Sensor Network [1,2,3,4] (WSN) comprises a large number of sensor nodes deployed in the monitoring area. Each sensor node is usually a battery-powered tiny device, which is responsible for sampling some attributes like temperature, humidity, pressure, luminous intensity, voice and image from surrounding area. Sensor nodes use simple radio module to communicate with each other. The nodes’ transmitting range is very limited. After being deployed, all the sensor nodes are self-organized as an Ad-Hoc network. Data exchange between two sensor nodes usually needs to relayed by many intermediate nodes. There is a data processing/storge center called sink or base station, which is responsible for receiving users’ queries, distributing queries to the relating sensor nodes, gathering data from the network and return results to users. Sensor nodes are usually deployed where personnel are difficult to reach, and it is impractical to exchange batteries for them, so how to save energy to prolong the life time of each sensor node becomes the main optimizing goal of WSNs. Research results [5,6] show that among all the operations of sensor nodes, wireless communication is the dominating factor for energy consumption. Thus, in-network query processing is necessary for sake of communication efficiency.
In recent years, data privacy of WSNs gets more and more attention [7,8,9,10]. Many reasons make adversaries interested about some nodes’ data in a WSN. For example, in a WSN deployed in the battle filed, our enemies want to intercept the data of reporting enemies’ invasion; Pharmaceutical advertisers want to get the data of people’s physiological indicators collected from the sensors worn by users; To know the location of wildlife, poachers want to access the data of sensor nodes deployed in the wild for wildlife monitoring. Such application scenarios have a strong need for data privacy protection [11].
In most applications of WSNs, users are more interested in the overall situation of the data of the whole network rather than the data of a certain node. Therefore, the queries issued by users are mainly aggregation queries, e.g., query the average of the temperature sampled by all the nodes or query the minimum value of the humidity sampled by the nodes in a given area. Characteristics of WSNs determine that the processing of aggregation queries should be done in-network rather than by the sink collecting the raw data of each node. Some privacy-sensitive application scenarios require us to consider data privacy in addition to efficiency while dealing with aggregation queries. Data privacy in WSNs means that the data of any node can not be obtained by the nodes other than the sink.
So far, all the existing data aggregation schemes [12,13,14,15,16,17,18,19,20,21,22,23] preserving data privacy in WSNs have some apparent drawbacks. The data privacy of some of these schemes is easily attacked, some of these schemes have high communication overhead and low efficiency, and all of these schemes can not deal with m i n ( ) / m a x ( ) queries. In this paper, we propose a Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS). RiPPAS performs aggregation through a pre-established ring structure. It uses a pseudonym mechanism for anonymous communication and uses a homomorphic encryption technique to add noise to the data that can easily be disclosed. Compared with the existing schemes, RiPPAS has three advantages: (1) It provides robust data privacy protection; (2) It is very communication-efficient; (3) It can handle all kinds of aggregation queries including m i n ( ) / m a x ( ) queries. Thus, the contribution of this paper comprises:
  • Designing a ring structure used for data collection and aggregation.
  • Proposing a ring-based privacy-preserving aggregation scheme (RiPPAS). RiPPAS provides robust privacy protection and has high efficiency. Furthermore, RiPPAS can deal with all kinds of aggregation queries.
The rest of the paper is organized as follows. Section 2 introduces the related works in this area; Section 3 gives some necessary preliminaries; Section 4 describes the ring structure used by RiPPAS; Section 5 and Section 6 gives details as to how RiPPAS handles s u m ( ) queries and m i n ( ) / m a x ( ) queries respectively. Section 7 gives the theoretical analysis and simulation results; Section 8 concludes the whole paper.

2. Related Works

Reference [24] gives a sketch of data aggregation techniques in WSNs. We focus on data privacy of WSNs in this paper. A survey of privacy preservation in WSNs is given by [19]. There are some works [12,13,14,15,16,17,18,19,20,21,22] that focus on processing aggregation queries with privacy preservation in WSNs. Reference [23] designs a middleware between the network layer and MAC layer to automatically aggregate the data from the network layer.
Reference [18] proposes two aggregation methods CPDA and SMART with privacy preservation, both of which can only deal with additive aggregation function s u m ( ) . Other aggregation queries like c o u n t ( ) , a v e r a g e ( ) and v a r i a n c e ( ) can be converted to s u m ( ) queries. Both of these two methods assume that a pair-wise key model has been pre-established, i.e., each pair of neighboring nodes shares an independent key for encrypting/decrypting messages between them. Therefore, any compromised node has no effect on the pair-wise keys shared by the other pairs of nodes. CPDA is based on a cluster structure. After building clusters, each node generates some random numbers locally, then gets some values calculated by a series of network-wide shared functions which take its local raw data and the generated random numbers as arguments. One of these values remains local, and other values are distributed within the cluster. Each node adds all the received values to its local value and sends the additive result to the cluster head. After the cluster head receives the results from all cluster members, it can get the sum of the private data of all cluster members by solving a linear equation. The intra-cluster information exchange process does not reveal the raw data of any node. Next, all the cluster heads are organized as a tree rooted at the sink. The aggregation of all cluster heads’ results are performed along the tree in a bottom-up manner. SMART is a tree-based aggregation method and has three steps. For initialization, all the nodes are organized as a spanning tree rooted at the sink. In the first step, each node divides its private data into J pieces, stores one of these pieces locally, then sends the other J 1 pieces randomly to different h-hop neighbors (Normally set h = 1 ). In the second step, each node adds all the received pieces to the locally stored piece. In the third step, in a bottom-up manner along the spanning tree, each node aggregates its local data and all the data from its children, then sends the result to its parent. Both CPDA and SMART methods need to exchange a large amount of data in the entire network to ensure data privacy, so their communication efficiency is not high. In addition, these two methods can not handle m i n ( ) / m a x ( ) queries.
In [12], a method named HEEPP similar to the SMART method is proposed to handle s u m ( ) queries while preserving data privacy. Unlike the SMART method, HEEPP only lets the leaf nodes in the spanning tree split their private data, while the intermediate nodes do not need to split their data. Each leaf node divides its private data into R pieces, and sends R 1 pieces to different h-hop neighbors, where R is a random integer in [ 1 , K ] and K is the maximum number of divided pieces set by users. HEEPP assumes that any two neighboring nodes share an independent key for point-to-point secure communication. Like the SMART method, HEEPP also needs to exchange a large amount of data in the network, so it has a relatively high communication overhead too. Also, HEEPP cannot handle m i n ( ) / m a x ( ) queries.
By improving the SMART method, Reference [17] also proposes a method named PEPDA to process s u m ( ) queries with privacy preservation. PEPDA improves the SMART methods in two aspects. In the first aspect, PEPPA splits the private data of each node into items of a power series (the former J terms). The power series is set to ensure that the first piece has the largest proportion in the private data, and the following pieces have gradually decreased proportion in the private data. Each node saves the first piece locally and sends the other J 1 pieces to different neighbors. If the data sent to a neighbor is lost, it will not affect the aggregation accuracy too much. In the second aspect, if a node does not have J 1 different neighbors, it performs no data division and sends its private data directly to its parent. PEPPA also assumes that any two neighboring nodes share an independent key. As a result of the need for massive data exchange in the network, PEPDA’s communication efficiency is also relatively low. PEPDA can not handle m i n ( ) / m a x ( ) queries either.
Similar to the CPDA method, a method named PAPF is proposed in [20,21] for handling s u m ( ) queries based on cluster structure. PAPF divides each cluster into multiple p-classes such that the size of each p-class meets some certain restrictions. Each node generates a series of random numbers and exchanges their random numbers within its p-class. Finally, each node constructs an μ-th order function named p-function. The construction process guarantees that the sum of the j-th ( 1 j μ ) order coefficient of all the p-functions in a p-class is equal to zero. Next, each node adds a noise calculated by its p-function to its private data, and sends the distorted data to the cluster head. The characteristics of the p-function ensure that the sum of all the distorted data in a p-class is equal to sum of all the private data. PAPF also assumes that any two neighboring nodes share an independent key, so point-to-point data transmission is secure. PAPF also has low communication efficiency, because it requires a lot of data exchange in the network. PAPF can not handle m i n ( ) / m a x ( ) queries either.
Based on homomorphic encryption technique, Reference [14,15] propose an approach for handling s u m ( ) queries with privacy preservation. The proposed method completes aggregation along a spanning tree rooted at the sink in a bottom-up manner. Each node v i holds a key K i shared with the sink only. Each v i encrypts its private data with function c i = E n c ( m i , K i ) = m i + K i ( m o d M ) , where m i is v i ’s private data and c i is the generated ciphertext. After receiving an intermediate node sum (modular sum) from all its children, all the received ciphertext and its locally generated ciphertext, then sends the result to its parent. Finally, the sink gets the result c a g g = c i ( m o d M ) , where c i is the sum of the ciphertext of all the nodes participating in the aggregation. Next, the sink applies function m a g g = D e c ( c a g g , k ) = c a g g k ( m o d M ) to decrypt the data. Where k = K i is the sum of the keys of all the nodes participating in the aggregation. The decrypted value m a g g is exactly equal to the sum of the private data of each node. In order to ensure the correctness of the calculation, M is set to a number larger than the sum of all nodes’ private data. This method does not require that the communication between any pair of nodes is encrypted with an independent key. However, to let the sink know which nodes are involved in the aggregation (so the sink can decrypt the data correctly), each aggregation value needs to be appended with the IDs of all the nodes participating in the aggregation. If there are a large number of nodes in the network, this additional information will involve a serious communication burden. The proposed method is only suitable for handling s u m ( ) queries.
Reference [22] also gives a privacy-preserving aggregation technique based on homomorphic encryption. The proposed method is both additively homomorphic and multiplicatively homomorphic, i.e., it can be used for finding the sum or the product of the data of multiple nodes. As a result of taking into account multiplicatively homomorphic situations, the encryption techniques are more complicated than the ones in [14,15], and the ciphertext sent by each node is much longer. From the perspective of data aggregation, the extra computation and communication costs are not worth it, since finding the product of data from some nodes is not a typical aggregation query and is rarely issued by users.
Reference [13] proposes a scheme to alleviate the network congestion by data aggregation. When a node’s communication bandwidth is less than the rate of generating data, the node will save the data in its buffer and upload it when the network is idle. When the data in its buffer is about to overflow, the node will aggregate all the data in its buffer and send out the aggregation value. In the process of data aggregation, the homomorphic encryption method proposed in [14,15] is used. Some additional information is added to each packet for integrity verification. This additional information makes the communication cost of the proposed method higher than that of the method in [14,15]. Furthermore, the proposed method is only suitable for handling s u m ( ) queries.
In summary, all the existing methods have two shortcomings: (1) low communication efficiency; (2) can not handle m i n ( ) / m a x ( ) queries.

3. Preliminaries

Before sensor nodes are deployed, the sink assigns each node v i : (1) a fixed ID (also denoted by v i ); (2) an independent key K i ; (3) m pseudonyms { P N i 1 , P N i 2 , , P N i m } ; (4) an identical function R ( K , t ) . Different nodes do not have any pseudonyms in common. R ( k , t ) is a function taking K and t as seeds to generate a pseudo random number, where K is the key assigned to the node and t is the query’s sequence number. The notations we use in this paper and their meanings can be found in Table 1. The sink uses a table to record the keys and pseudonyms assigned to each node. At regular intervals, the sink reassigns pseudonyms for all nodes. The new pseudonyms assigned to v i are encrypted with K i . The table maintained by the sink is as shown in Table 2. The information of each node is recorded by a tuple in the table. After the ring structure used for data collection and aggregation has just been established, each node v i encrypts its location with K i and uploads it to the sink. The sink decrypts v i ’s location using K i , and saves its location into the table.
We assume that all the nodes use one public channel to communicate with each other. All the links in the given network are bidirectional, i.e., if v can receive the signal from u then u can receive the signal from v. After the nodes are deployed, each pair of neighboring nodes share an independent key to encrypt/decrypt the messages between them. Refer to [25,26,27] for how to generate pairwise shared keys amongst neighboring nodes. It should be noted that when building ring structure and processing m i n ( ) / m a x ( ) queries, there is no need to encrypt point-to-point communications.
We assume that the goal of adversaries is to get the private data of some certain nodes. Adversaries may attack data privacy in two ways: eavesdropping on the communication channel or capturing nodes. Adversaries launches eavesdropping attack by deploying some wireless communication devices in the network area which can eavesdropping on nearby data transmissions. If data transmission is done using cryptographic encryption techniques, adversaries can not get the real content of the data only through eavesdropping. Adversaries launch a capturing attack by capturing some sensor nodes in the network physically. Once adversaries capture a node, they get the data of the node and all the keys maintained by the node for encryption/decryption, so the node becomes a compromised node and adversaries can decrypt all the packets sent to the node. Furthermore, adversaries can launch a collusion attack by gathering all the data from the eavesdropping devices and the compromised nodes. Moreover, we assume that adversaries can not approximate the sender’s location by measuring signal strength in a collusive way.

4. Ring Structure

In this section, we describe the ring structure we used for data aggregation.

4.1. Building Ring Structure

We want to build a sink-centered ring structure as shown in Figure 1, which is similar to the sink-rooted tree structure. The main difference between the ring and tree is that a node in a tree has only one parent whereas a node in a ring can have more than one predecessor (equivalent to the parent in the tree). In the ring structure, nodes are organized in levels. The level of the sink is 0 and the level of the sink’s direct neighbor is 1. The farther a node is from the sink, the higher level the node is. We use l e v e l ( v i ) to denote v i ’s level. v i has one or more predecessors in l e v e l ( v i ) 1 , each of which can forward the messages that v i sends to the sink. We use P r e d ( v i ) = { v j , v k , } to denote the set of v i ’s predecessors. v i has some successors in l e v e l ( v i ) + 1 and v i can forward the messages they send to the sink. v i uses variable S N ( v i ) to record the number of its successors. A node v i with no successors (i.e., S N ( v i ) = 0 ) is called an outer node. A node who has successors is called an inner node.
After all the nodes are deployed, the sink broadcasts a BUILD-RING message < s i n k , 0 > including its ID and level to initialize the process of building a ring. When a node v i receives a BUILD-RING message (let the message be < v j , l e v e l ( v j ) > ) for the first time, v i sets its own level to l e v e l ( v i ) = l e v e l ( v j ) + 1 and records v j as one of its predecessors, then broadcasts a BUILD-RING message < v i , l e v e l ( v i ) > . While v i receives another BUILD-RING message < v k , l e v e l ( v k ) > after broadcasting BUILD-RING message, it checks l e v e l ( v k ) . If l e v e l ( v k ) = l e v e l ( v i ) 1 , then v i records v k as one of its predecessors. If l e v e l ( v k ) = l e v e l ( v i ) + 1 , it means that v k is v i ’s successor, so v i adds 1 to its S N ( v i ) . After the ring is established, each node v i knows: (1) its level l e v e l ( v i ) ; (2) the set of its predecessors P r e d ( v i ) ; (3) the number of its successors S N ( v i ) . The detail pseudo-codes for building the ring are given by Algorithm 1.
Algorithm 1: Building Ring Structure
Input: a sensor network
Output: a ring structure centered at the sink
/* Codes for each node v i t h e s i n k . The process starts with the sink
  broadcasting a BUILD-RING message < s i n k , 0 > .          */
Sensors 17 00300 i001

4.2. Data Collection/Aggregation in the Ring

The built-up ring structure can be used for data collection/aggregation of the whole network. The header of each packet used for data collection/aggregation contains the following information: (1) the receiver’s ID (which can be a broadcast address); (2) the sender’s ID; (3) the sender’s level. The header of a packet is always being transmitted in plaintext. The process of data collection/aggregation is as follows.
If node v i is an outer node, i.e., S N ( v i ) = 0 , then v i sends its data to its predecessor(s). There are two ways to send the data:
  • Real-name ciphertext unicasting. v i randomly pick a predecessor v j from P r e d ( v i ) , encrypts its data with the key shared by v i and v j , and sends out a packet with the encrypted data in its data field. The header of the packet is set as follows: the receiver’s ID is set to v j ; the sender’s ID is set to v i ; the sender’s level is set to l e v e l ( v i ) . After receiving this packet, by reading the packet’s header, v j can know that the sender is v i , so v j uses a corresponding key to decrypt the data field of the packet and gets v i ’s data.
  • Anonymous plaintext broadcasting. v i constructs a packet and puts its data in the packet’s data field in plaintext, then broadcasts the packet. The header of the packet is set as follows: the receiver’s ID is set to the broadcast address; the sender’s ID is set to blank; the sender’s level is set to l e v e l ( v i ) . In this way, every node receiving the packet is able to obtain v i ’s data but has no way of distinguishing the packet’s sender. As stated in [28,29], we assume that the sensor nodes have ability to obfuscate address fields in their Medium Access Control (MAC) layer header, so that a compromised node can not know the sender’s identity by parsing a packet’s MAC layer header.
While node v i hears a packet sent from l e v e l ( v i ) + 1 , no matter the receiver is v i or not, v i adds 1 to its h e a r ( v i ) , where h e a r ( v i ) indicates the number of the packets v i hears from its successors in the current round of collection/aggregation. The characteristics of radio transmission determine that the nature of all data transmission is broadcasting. Therefore, even if a packet’s destination address is not v i , as long as v i is in the sender’s communication range, it can hear the packet and know the sender’s level by reading packet header. If h e a r ( v i ) = S N ( v i ) , it means that all the successors of v i have sent data in this round of data collection/aggregation, so v i integrates all the received data (decrypts first if it is encrypted) into a packet and sends the packet to its predecessor(s) by either real-name ciphertext unicasting or anonymous plaintext broadcasting.
In the process of collection/aggregation, the failures or compromises of nodes may cause that some intermediate nodes keep waiting for hearing from its successors. For this reason, we set a timer for each node. The duration of each node’s timer is determined by the size of the network and the node’s level. When the timer expires, no matter if a node has heard from all its successors or not, it will upload its local result anyway.

4.3. Advantages of Ring-Based Collection/Aggregation

Compared with tree-based collection/aggregation, ring-based collection/aggregation has an important advantage such that the data of each node goes to the sink along unfixed path. Even if adversaries can get the data in some packets, it is very difficult for them to trace the sources of the data. Here, we also stipulate that each node v i refuses to answer any query about a packet’s source unless v i receives a message from the sink encrypted with K i .
Suppose that we collect data by real-name ciphertext unicasting. In a tree structure, if adversaries capture a node v i , they will be able to parse the data of all the nodes in the subtree rooted at v i . Since the subtree rooted at v i is fixed, adversaries can perform long-term behavior analysis for the nodes in the subtree. In a ring structure, even if adversaries capture node v i , because v i receives data from an uncertain set of nodes, it is very hard for the adversaries to perform a long time analysis for some nodes.
When processing a m i n ( ) / m a x ( ) queries, each data is appended with a pseudonym to indicate the source of the data. Ring structure is very beneficial to the designed pseudonym mechanism. Suppose that adversaries have captured a node v i . If we use tree structure for aggregation, since the sub-tree rooted at v j is fixed, by listening messages for a long time, v i can easily associate a node in the subtree with a set of pseudonyms, especially when there are fewer nodes in the subtree. If we use ring structure for aggregation, it is very hard for adversaries to know the corresponding relationship between pseudonyms and the nodes.
As with the tree structure, the ring structure does not require synchronization in the network. The process of data collection/aggregation is entirely message-driven.

5. Handling sum ( ) Queries

In this section, we describe how RiPPAS handles s u m ( ) queries. Some other types of queries like c o u n t ( ) , a v e r a g e ( ) and v a r i a n c e ( ) can be converted to s u m ( ) queries [14,15]. While performing aggregation in the ring structure, RiPPAS uses homomorphic encryption technique to add noise to outer nodes’ private data. Let d i denote the private data generated by node v i in this round of aggregation. The procedure for RiPPAS handling s u m ( ) queries is given by Algorithm 2.
Algorithm 2: Dealing with s u m ( ) queries
Input: a sensor network with ring structure established
Output: the sum of all nodes’ data
Sensors 17 00300 i002
For an outer node v i : it adds noise R ( K i , t ) to its the private data d i and generates noisy data
c i = d i + R ( K i , t ) ( mod M )
where R is a function used by nodes to generate a pseudo random value, t is the sequence number of the current query, and M is a predetermined constant satisfying M for all v i d i . Next, v i randomly picks a pseudonym from its pseudonym set { P N i 1 , P N i 2 , , P N i m } and adds it to the set N L i (Line 4–5 in Algorithm 2). N L i records which nodes have added noise to the result c i in form of pseudonym. Finally, v i sends the data < c i , N L i > to a randomly selected successor v h by real-name ciphertext unicasting (Line 6–7 in Algorithm 2).
For an inner node v i : if v i hears a packet P sent from its next level (confirmed by checking the sender’s level in P’s header), it adds 1 to its local variable h e a r ( v i ) (Line 12–13 in Algorithm 2). If P is sent to v i (confirmed by checking the receiver’s ID in P’s header), according to the sender’s ID (let the sender be v j ), v i finds the corresponding key to decrypt P and gets its data < c j , N L j > (Line 14–15 in Algorithm 2). Let < c j 1 , N L j 1 > , , < c j k , N L j k > be all the data received by v i . Then v i sets
c i = d i + x = 1 k c j x ( mod M )
and
N L i = x = 1 k N L j x
If all its successors have uploaded their data, i.e., h e a r ( v i ) = S N ( v i ) , v i sends < c i , N L i > to a randomly selected predecessor v h by real-name ciphertext unicasting (Line 19–20 in Algorithm 2).
The sink does the following: decrypt each received packet to get its data < c j , N L j > , and use variable c a g g to aggregate all the received c j , i.e.,
c a g g = i = 1 n c i ( mod M )
For each pseudonym p n in each received N L j , look up the maintained table and find out which node p n is assigned to (let the node be v x ). Calculate the noise R ( K x , t ) that v x adds to the result. Use variable r a g g to record the sum of all the added noise (Line 28–29 in Algorithm 2), i.e.,
r a g g = for each outer node v i R ( K i , t ) ( mod M )
If has received from all the nodes in the first level, de-noise the result c a g g by the function
d a g g = c a g g r a g g ( mod M )
Return the result d a g g to users(Line 31–32 in Algorithm 2). d a g g is the sum of each node’s private data.
In the whole aggregation process, the local aggregation result c i uploaded by each node v i has constant length. Only outer nodes need to add noise to their results and append their pseudonyms. All inner nodes do not need to add noise or append pseudonyms. Therefore, the communication efficiency for RiPPAS handling s u m ( ) queries is very high.

6. Handling min ( ) / max ( ) Queries

In this section, we describe how RiPPAS handles m i n ( ) / m a x ( ) queries. By issuing a m i n ( ) / m a x ( ) query, users are concerned with the minimum/maximum value of the data in the entire network, as well as the node that generates the value and its location. When processing a m i n ( ) / m a x ( ) query, RiPPAS focuses on protection of the source of the minimum/maximum value. It uses a pseudonym mechanism for anonymous communication. The process for RiPPAS handling m a x ( ) queries is given by Algorithm 3.
Algorithm 3: Dealing with m a x ( ) query
Input: a sensor network with ring structure established
Output: the maximum value of all nodes’ data, the node generating the maximum value and its location
Sensors 17 00300 i003
The nodes in the ring upload their local results level by level. Data packets are transmitted by anonymous plaintext broadcasting, so the receiver of a packet has no information about the sender except for its level in the ring. The data packet uploaded by node v i has the form < m a x i , s o u r c e i > , where m a x i is v i ’s local maximum value (the maximum value of the data received by v i and its private data), s o u r c e i is the pseudonym of the node who generate m a x i . s o u r c e i is uploaded so that the sink can know the source of the maximum value by looking up the pseudonym table.
First, each outer node sends its data with a randomly picked pseudonym to all its predecessors by anonymous plaintext broadcasting (Lines 3–6 in Algorithm 3). After an inner node receives data from all its successors, it gets the maximum value from the set including all the received data and its own data, attaches the corresponding pseudonym (if the maximum value is v i ’s own data, v i randomly picks a pseudonym and appends it to the data), then sends the maximum value to all its predecessors by anonymous plaintext broadcasting (Lines 8–18 in Algorithm 3). Finally, the sink gets the maximum value of the entire network and its source’s pseudonym. By looking up the maintained table, the sink will know the source’s ID and location (Lines 21–27 in Algorithm 3).
When processing a m i n ( ) / m a x ( ) query, RiPPAS guarantees that as long as adversaries do not capture the source node of the maximum/minimum value, it is impossible for them to know the source node’s ID and its location. The shortcoming of RiPPAS is that adversaries can get the maximum/minimum value by eavesdropping even if they do not capture any nodes. However, As we have stated before, the most import information of m i n ( ) / m a x ( ) aggregation is not the maximum/minimum value itself, but the node who generates the maximum/minimum value and its location. Thus, to process m i n ( ) / m a x ( ) queries, each node upload its data by anonymous plaintext broadcasting. If users want to prevent the disclosure of the maximum/minimum value information, we can modify RiPPAS and let each node upload its data by real-name ciphertext unicasting.

7. Evaluation

The performance of RiPPAS is evaluated in this section. The evaluation is done in three aspects: (a) privacy preservation; (b) communication overhead; (c) aggregation accuracy.
For s u m ( ) queries, we compare RiPPAS with three other aggregation methods: (1) the SMART method proposed in [18]; (2) the HEEPP method proposed in [12]; (3) the method based on homomorphic encryption proposed in [14,15] (denoted by “HOMOENC”). All the other three methods can not deal with m i n ( ) / m a x ( ) queries.
For m i n ( ) / m a x ( ) queries, we compare three aggregation schemes: (1) the RiPPAS scheme that each node uploads data by anonymous plaintext broadcasting (denoted by RiPPAS_APB); (2) the RiPPAS scheme that each node uploads data by real-name ciphertext unicasting (denoted by RiPPAS_RCU); (3) the tree-based aggregation scheme proposed in [30] (denoted by EADAT) with the improvement that each pair of neighbors use an independent key to encrypt/decrypt the communication between them. In EADAT, all the nodes are organized as a spanning tree rooted at the sink. In a bottom-up manner, each node sends its local maximum/minimum value with the ID of the data’s source to its parent. Note that EADAT deals with m i n ( ) / m a x ( ) queries without any data privacy concern. Since all the existing methods can not deal with m i n ( ) / m a x ( ) queries with privacy preservation, we choose the most typical method to compare with the proposed methods.
We use a simulator written in C++ to do the evaluation. The simulation environment is set as follows: 2500 sensor nodes are randomly deployed in a 1500 m × 1500 m area. Each node is assigned m = 20 pseudonyms. As a result, the sink uses a 120 M table to records the information of all the sensor nodes. The effective transmitting range of each sensor node is set to 50 m, so each node has 8.7 neighbors on average. We divide the time into equal-sized time slots. The transmission of any data packet can be done in one time slot. Each node can only send or receive one data packet (can not both send and receive) in one time slot. Each data packet has a 7-byte header containing the information of packet type (1 byte), receiver’s ID (2 bytes), sender’s ID (2 bytes), sender’s level in the ring (1 byte) and packet length (1 byte). The data field of each packet contains up to 50 bytes. We synthesize the sampled data for each node according to the data set in [31]. Each node samples four kinds of data: temperature, humidity, light, voltage. To get each point in the result figures, we conduct 10 simulations and take their average value. When pair-wise encrypted communication is required in SMART, HEEPP, RiPPAS_RCU and EADAT, we use the encryption/decryption technique in [32].

7.1. Privacy Preservation

Next, for an arbitrary node v in the given network, we will analyse the probability that v’s private data is disclosed to adversaries in different aggregation schemes. Here, we assume that v itself is not captured by adversaries. As we stated in Section 3, adversaries can launch collusion attack by gathering all the data from the eavesdropping devices and the captured nodes. As a result, for each wireless link in the given network, adversaries has a certain probability to break the link. “Break a link” means that adversaries know the key used for encryption/decryption, so they can get all the data transmitted on the link. We use q b to denote the probability that any link is broken by adversaries.

7.1.1. Privacy Preservation for s u m ( ) Queries

Let us analyse the privacy preservation for RiPPAS processing s u m ( ) queries. For an outer node v, since it adds noise to its private data and only the sink has the key to de-noise the data, adversaries can not get v’s private data if they do not capture v. Let P v ( q b ) be the probability that v’s data is disclosed under the setting of q b . For outer node v in RiPPAS, we have
P v ( q b ) = 0
For an inner node v, let P r e S u c ( v ) be the set including v’s successors who upload their aggregation reults to v and v’s predecessor to whom v upload its result, i.e.,
P r e S u c ( v ) = { u | u uploads its results to v } { u | v uploads its result to u }
Adversaries can only get the v’s data by breaking all the links connecting v and the nodes in P r e S u c ( v ) . Therefore, for inner node v in RiPPAS, we have
P v ( q b ) = k = 1 m a x _ d P r { | P r e S u c ( v ) | = k } · q b k
where P r { | P r e S u c ( v ) | = k } is the probability that | P r e S u c ( v ) | = k and m a x _ d is the maximum degree in the network.
For s u m ( ) queries, SMART organizes all the node as a spanning tree. Each node divides its private data into J pieces, then sends J 1 pieces to different neighbors. Define node set I n O u t ( v ) as
I n O u t ( v ) = { u | u sends its piece to v } { u | v sends its piece to u }
In SMART, adversaries can only get v’s data by breaking all the links connecting v and the nodes in I n O u t ( v ) . Therefore, for any node v in SMART, we have
P v ( q b ) = k = 1 m a x _ d P r { | I n O u t ( v ) | = k } · q b k
HEEPP is similar to SMART. In HEEPP, only leaf nodes in the spanning tree split their private data. Each leaf node divides its private data into R pieces, and sends the R 1 pieces to different neighbors, where R is a random integer in [ 1 , K ] . Similar to SMART, for a leaf node in HEEPP, the probability that adversaries can get v’s private data is given by Equation (5). In HEEPP, adversaries can get an intermediate node’s private data by getting all the data its children send to the node and the data the node send to its parent. Define node set P a C h ( v ) as
P a C h ( v ) = { u | u is v s child or u is v s parent }
Therefore, for intermediate node v in HEEPP, we have
P v ( q b ) = k = 1 m a x _ d P r { | P a C h ( v ) | = k } · q b k
HOMOENC uses homomorphic encryption to process s u m ( ) queries. Each node encrypts its private data and only the sink can decrypt the data. All the aggregation is done on ciphertext. Adversaries can not get a node’s private data anyway (if they do not capture the node itself). Thus, for any node v in HOMOENC, we have
P v ( q b ) = 0
Both RiPPAS and HOMOENC use homomorphic encryption for secure data aggregation. In HOMOENC, every node encrypts its local result before uploading it. The additively homomorphic encryption function used by HOMOENC can be seen as adding some noise to the real data. The noise is generated by a pseudo random function taking node’s key as seed. For a node who add noise to its private data, only the sink can de-noise the noisy data, so adversaries have no way to get the node’s private data (except for capturing the node itself). From the perspective of data privacy, letting every node use additively homomorphic encryption function to encrypt its local result is very safe. However, to let the sink de-noise the result correctly, each node adding noise to the result has to append its ID to the result, which poses a heavy burden on communication.
The encryption technique used in RiPPAS is almost as same as the one used in HOMOENC. The only difference is that in RiPPAS, the function used by each node to generate a pseudo random noise takes both the node’s key and the query’s sequence number as seeds, which makes the homomorphic encryption in RiPPAS is more secure. In the process of aggregation, the outer nodes in the ring have to upload their private data, so their data privacy is vulnerable to attack. On the contrary, the data uploaded by an inner node is the aggregation result of its private data and the data from its successors, so it is very difficult for adversaries to attack their data privacy. In RiPPAS, we only let the outer nodes encrypt their data. For an outer node, adversaries have no way to get its private data. For an inner node, the only way adversaries can get its private data is by getting the data the node sends out and all the data sent into the node, which is still a very hard task for adversaries. Compared to HOMOENC, RiPPAS is a little more vulnerable. However, only the outer nodes in RiPPAS have to append its ID to the aggregation result, which makes RiPPAS much more communication efficient than HOMOENC.
In our simulation we set J = 3 for SMART and set K = 5 for HEEPP. The effectiveness of privacy preservation is measured by the percentage of the nodes whose data is disclosed to adversaries. The comparison results of privacy preservation performance for processing s u m ( ) queries on temperature is given by Figure 2a. Except for HOMOENC, the larger q b , the weaker privacy preservation. HOMOENC always gives the best performance. Since HOMOENC uses homomorphic encryption technique, it is impossible for adversaries to obtain a node’s private data. RiPPAS outperforms SMART and HEEPP in this aspect. In RiPPAS, outer nodes’ data can not be disclosed anyway. Adversaries cannot get an inner node’s data unless they get all the data the node receives and the data the node sends out. In SMART and HEEPP, it is relatively easier for adversaries to get a node’s private data.
By ring-based aggregation, RiPPAS has more advantages in addition to the simulation results shown. Suppose that adversaries want to make sure to get a certain node v’s private data. For an outer node v, if v is not captured, adversaries can not get v’s private data anyway. Recall that each node uploads its aggregation result to a randomly picked predecessor. Adversaries will never know which nodes upload their results to v and to which node v uploads its result. Therefore, for an inner node v, if v is not captured, to make sure to get v’s private data, adversaries have to break all the links connecting v with all its predecessors and successors. Apparently, it is a very hard task for adversaries. Compared with a tree-based method, the ring-based aggregation scheme makes it harder for adversaries to attack data privacy. Furthermore, as we state in Section 4.3, ring-based aggregation can effectively prevent attackers from performing long-term behavior analysis on some nodes.

7.1.2. Privacy Preservation for m i n ( ) / m a x ( ) Queries

For a m i n ( ) / m a x ( ) query, it is not very meaningful to know the maximum/minimum value in the whole network without knowing its source. For such kind of queries, the disclosure of node v’s data privacy is defined as adversaries can get v’s private data and know that v is the source of the data. In the following, we only discuss the case of processing a m a x ( ) query. The case of processing a m i n ( ) query is similar.
In the RiPPAS_APB scheme, nodes upload their data by anonymous plaintext broadcasting. By eavesdropping, adversaries can easily get the data in a packet by eavesdropping, but they cannot know who the sender of the packet is. On the other hand, during the aggregation process, each node uploads its local maximum value with the pseudonym of the value’s source and only the sink knows which node the pseudonym corresponds to. By eavesdropping on the transmission of a packet, adversaries cannot determine the source of the maximum value in the packet, i.e., adversaries can not relate any data to its real source. Thus, in RiPPAS_APB, the probability that any node v’s data privacy is disclosed is given by
P v ( q b ) = 0
In the RiPPAS_RCU scheme, nodes upload their data by real-name ciphertext unicasting. Ciphertext transmission makes it relatively difficult for adversaries to break a link. However, once adversaries beak a link and get a packet transmitted on the link, they can know the real ID of the packet’s sender, which gives them opportunities to attack a node’s data privacy. If v’s private data is its local maximum value, v will append a randomly selected pseudonym to its private data and send its real-name. In this case, if adversaries can get all the packets v receives and the packet v sends out, they can distinguish that the pseudonym in the packet v sends out is different from all the pseudonyms in the packets v receives, and know that the data v sends out is generated by v itself. Therefore, if v’s private data is its local maximum value, adversaries can get v’s private data and know that v is the source of the data by breaking all the links connecting v and the nodes in P r e S u c ( v ) . Here, P r e S u c ( v ) is the node set defined by Equation (2). For any node in the RiPPAS_RCU scheme, we have
P v ( q b ) = P v m a x · k = 1 m a x _ d P r { | P r e S u c ( v ) | = k } · q b k
where P v m a x is the probability that v’s private data is its local maximum value.
In EADAT, each node in the spanning tree sends its local maximum value and the ID of the value’s source to its parent. Let u be one of v’s ancestors in the tree. Adversaries can get node v’s private data by breaking the link between u and u’s parent in the context that v’s private data is the local maximum value of u. Therefore, for any node v in EADAT, we have
P v ( q b ) = u A N ( v ) P v , u m a x · q b
where A N ( v ) is the set of v’s ancestors in the tree and P v , u m a x is the probability that v’s private data is the local maximum value of u.
The privacy preservation performance for processing m i n ( ) / m a x ( ) queries on temperature is given by Figure 2b. We can see that, except for RiPPAS_APB, the larger q b is, the weaker the privacy preservation is. In RiPPAS_APB, it is impossible for adversaries to get any node’s private data unless they capture the node itself, so RiPPAS_APB outperforms RiPPAS_RCU. Since EADAT does not concern the data privacy, it is much worse than the proposed two schemes in the aspect of privacy preservation.

7.2. Communication Overhead

We compare the communication overheads for different schemes processing aggregation queries on different attributes. Recall that SMART, HEEPP, HOMOENC and EADAT all require a pre-established tree structure, and RiPPAS requires to build a ring structure before aggregation. We also compare the communication overheads for different schemes building the pre-established structures. Communication overhead is represented by average number of bytes sent and received by each node.
The communication overheads for SMART, HEEPP, HOMOENC and RiPPAS to process s u m ( ) queries on different attributes are given by Figure 3a, in which “building” denotes the communication overheads for building the pre-established structures. We can see that HOMOENC has the lowest building communication overhead. This is because HOMOENC does not require pair-wise key exchanging for secure point-to-point communication. The building communication overhead of RiPPAS is a little higher than the one of SMART and HEEPP, because the ring structure is a little more complex than the tree structure. The communication overheads for each scheme to process queries on different attributes are almost the same. RiPPAS always gives the best performance and is apparently better than the other three methods in this aspect. RiPPAS gains its communication efficiency because only the outer nodes add noise to their data and each node only uploads its local result once. In SMART and HEEPP, nodes split their data into pieces and exchanging data pieces among neighbors, which introduces a considerable communication overhead. HOMOENC has the worst performance. In HOMOENC, each aggregation data is uploaded with the IDs of all the nodes that participate in the aggregation. In a large-scale network, the ID list sent by a node near the sink will be extremely long.
The communication overheads for RiPPAS_APB, RiPPAS_RCU and EADAT to process m i n ( ) / m a x ( ) queries on different attributes are given by Figure 3b. The building communication overhead of RiPPAS_APB is much lower than the ones of RiPPAS_RCU and EADAT. Since RiPPAS_APB does not use point-to-point encrypted transmission, there is no pair-wise key exchanging phase in RiPPAS_APB. Compared with RiPPAS_RCU and EADAT, RiPPAS_APB has apparently lower communication overhead for processing m i n ( ) / m a x ( ) queries on different attributes. Since RiPPAS_APB does not require encrypted transmission of data packets, the packets in RiPPAS_APB are much shorter. EADAT outperforms RiPPAS_APB a little bit because there are fewer receiving activities using a tree structure to perform aggregation compared with using a ring structure.

7.3. Aggregation Accuracy

In ideal situations when there is no data loss in the network, all the compared schemes give 100 % accurate results. However, in reality, data loss is inevitable due to the node dying, wireless interference, signal collision and processing delay. We need to measure how an aggregation scheme is affected by data loss. The comparison is conducted by aggregating on different attributes.
The aggregation accuracy for SMART, HEEPP, HOMOENC and RiPPAS to process s u m ( ) queries on different attributes is given by Figure 4a. Each scheme has almost the same performance on different attributes. HEEPP gives the best performance in this aspect. RiPPAS gives almost the same performance with negligible gap. SMART is a little wore than HEEPP and RiPPAS, but the gap is not apparent. HOMOENC is much worse than the other three schemes. In HOMOENC, since each aggregation data is uploaded with the IDs of all the nodes who participate in the aggregation, there are many very long packets in the area near the sink. These packets are very easily to lose due to their length. Once a packet near the sink area is lost, we lose the data of a large part of the network.
The aggregation accuracy for RiPPAS_APB, RiPPAS_RCU and EADAT to process m i n ( ) / m a x ( ) queries on different attributes is given by Figure 4b. RiPPAS_APB gives the best performance in this aspect. Since each node uploads its local result by broadcasting in RiPPAS_APB, the maximum/minimum value can reach the sink along different paths, and data loss at a node or on a link will not affect the final result with great probability. EADAT gives the worst performance. By using tree structure for aggregation in EADAT, once a node fails to upload its data to its parent, we lose the result derived from all the data in the subtree rooted at the node.
Some detailed simulation results can be found in Table 3 and Table 4, where privacy preservation is measured by the percentage of the nodes whose data is disclosed and communication overhead is measured by the average number of bytes sent and received by each node.

8. Conclusions

We propose a scheme RiPPAS for aggregation with privacy preservation in wireless sensor networks. RiPPAS adopts a ring structure to perform aggregation. It uses a pseudonym mechanism for anonymous communication and uses a homomorphic encryption technique to easily add noise to the data to be disclosed. Theoretical analysis and simulation results prove that while processing s u m ( ) queries, RiPPAS has advantages in the aspects of privacy preservation and communication efficiency compared to the existing privacy-preserving aggregation methods. Furthermore, RiPPAS can process m i n ( ) / m a x ( ) queries whereas all the existing methods cannot. Future research directions in this area may be: providing privacy protection for more complex queries or providing differential privacy protection in distributed environments.

Acknowledgments

This work is supported by National Natural Science Foundation of China (Grant No. 61300207, Grant No. 61370084, Grant No. 61502116), Fundamental Research Funds for the Central Universities (Grant No. HEUCF160604, Grant No. HEUCFD1508). Harbin Application Technology Research and Development Project (Grant No. 2016RAQXJ063, Grant No. 2016RAXXJ013).

Author Contributions

Kejia Zhang gave the basic idea of the paper. Kejia Zhang and Zhipeng Cai and designed the algorithms and the experiments; Guisheng Yin performed the experiments; Qilong Han wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheng, S.; Cai, Z.; Li, J.; Fang, X. Drawing dominant dataset from big sensory data in wireless sensor networks. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 531–539.
  2. He, Z.; Cai, Z.; Cheng, S.; Wang, X. Approximate aggregation for tracking quantiles and range countings in wireless sensor networks. Theor. Comput. Sci. 2015, 607, 381–390. [Google Scholar] [CrossRef]
  3. Huang, H.; Gong, T.; Chen, P.; Malekian, R.; Chen, T. Secure two-party distance computation protocol based on privacy homomorphism and scalar product in wireless sensor networks. Tsinghua Sci. Technol. 2016, 21, 385–396. [Google Scholar] [CrossRef]
  4. Song, H.; Srinivasan, R.; Sookoor, T.; Jeschke, S. Smart Cities: Foundations Principles and Applications; Wiley: Hoboken, NJ, USA, 2017. [Google Scholar]
  5. Estrin, D. Wireless Sensor Networks Tutorial Part IV: Sensor Network Protocols. In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, Atlanta, GA, USA, 23–28 September 2002; pp. 23–28.
  6. Cheng, S.; Cai, Z.; Li, J. Curve query processing in wireless sensor networks. IEEE Trans. Veh. Technol. 2015, 64, 5198–5209. [Google Scholar] [CrossRef]
  7. He, Z.; Cai, Z.; Sun, Y.; Li, Y.; Cheng, X. Customized privacy preserving for inherent data and latent data. Pers. Ubiquitous Comput. 2017, 21, 43–54. [Google Scholar] [CrossRef]
  8. Song, H.; Fink, G.A.; Rosner, G.L.; Jeschke, S. (Eds.) Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications; Wiley-IEEE Press: London, UK, 2017.
  9. Lin, C.; Song, Z.; Song, H.; Zhou, Y.; Wang, Y.; Wu, G. Differential Privacy Preserving in Big Data Analytics for Connected Health. J. Med. Syst. 2016, 40, 1–9. [Google Scholar] [CrossRef] [PubMed]
  10. Lin, C.; Wang, P.; Song, H.; Zhou, Y.; Liu, Q.; Wu, G. A differential privacy protection scheme for sensitive big data in body sensor networks. Ann. Telecommun. 2016, 71, 465–475. [Google Scholar] [CrossRef]
  11. Guo, X.; Li, H.; Wulamu, A.; Xie, Y.; Fu, Y. Efficient processing of skyline group queries over a data stream. Tsinghua Sci. Technol. 2016, 21, 29–39. [Google Scholar] [CrossRef]
  12. Liu, C.X.; Liu, Y.; Zhang, Z.J.; Cheng, Z.Y. High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int. J. Commun. Syst. 2013, 26, 380–394. [Google Scholar] [CrossRef]
  13. Sicari, S.; Grieco, L.A.; Boggia, G.; Coen-Porisini, A. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. J. Syst. Softw. 2012, 85, 152–166. [Google Scholar] [CrossRef]
  14. Castelluccia, C.; Chan, A.C.F.; Mykletun, E.; Tsudik, G. Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Trans. Sens. Netw. 2009, 5, 20. [Google Scholar] [CrossRef]
  15. Castelluccia, C.; Mykletun, E.; Tsudik, G. Efficient Aggregation of encrypted data in Wireless Sensor Networks. In Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, CA, USA, 17–21 July 2005; pp. 109–117.
  16. Lee, H.; Lee, K.; Shin, Y. AES Implementation and Performance Evaluation on 8-bit Microcontrollers. Int. J. Comput. Sci. Inf. Secur. 2009, 6, 70–74. [Google Scholar]
  17. Yang, G.; Li, S.; Xu, X.; Dai, H.; Yang, Z. Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 9, 427275. [Google Scholar] [CrossRef]
  18. He, W.; Liu, X.; Nguyen, H.; Nahrstedt, K.; Abdelzaher, T. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 6–12 May 2007; pp. 2045–2053.
  19. Li, N.; Zhang, N.; Das, S.K.; Thuraisingham, B. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Netw. 2009, 7, 1501–1514. [Google Scholar] [CrossRef]
  20. Zeng, W.; Lin, Y.; Wang, L. Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks. In Proceedings of the IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, UK, 29 June–1 July 2010; pp. 2831–2836.
  21. Zeng, W.; Lin, Y.; Yu, J.; He, S.; Wang, L. Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks. Adhoc Sens. Wirel. Netw. 2014, 21, 21–58. [Google Scholar]
  22. Girao, J.; Westhoff, D.; Schneider, M. CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC), Seoul, Korea, 16–20 May 2005; pp. 3044–3049.
  23. Frej, M.B.H.; Elleithy, K. Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks. In Proceedings of the IEEE 14th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, USA, 9–11 December 2015; pp. 330–334.
  24. Rajagopalan, R.; Varshney, P. Data-aggregation techniques in sensor networks: A survey. IEEE Commun. Surv. Tutor. 2007, 8, 48–63. [Google Scholar] [CrossRef]
  25. Chaphekar, P.P. Survey of Key Distribution Schemes for Wireless Sensor Networks. arXiv 2014. [Google Scholar]
  26. Zhu, S.; Setia, S.; Jajodia, S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. 2006, 2, 500–528. [Google Scholar] [CrossRef]
  27. Eschenauer, L.; Gligor, V.D. A Key-management Scheme for Distributed Sensor Networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 41–47.
  28. Kong, J.; Hong, X. ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, Annapolis, MD, USA, 1–3 June 2003; pp. 291–302.
  29. Misra, S.; Xue, G. Efficient Anonymity Schemes for Clustered Wireless Sensor Networks. Int. J. Sens. Netw. 2006, 1, 50–63. [Google Scholar] [CrossRef]
  30. Ding, M.; Cheng, X.; Xue, G. Aggregation tree construction in sensor networks. In Proceedings of the IEEE 58th Vehicular Technology Conference, Orlando, FL, USA, 6–9 October 2003; pp. 2168–2172.
  31. Intel Lab Data. Available online: http://db.csail.mit.edu/labdata/labdata.html (accessed on 1 August 2016).
  32. Karlof, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 3–5 November 2004; pp. 162–175.
Figure 1. Ring Structure.
Figure 1. Ring Structure.
Sensors 17 00300 g001
Figure 2. Privacy preservation performance. (a) Handling s u m ( ) queries on temperature; (b) Handling m i n ( ) / m a x ( ) queries on temperature.
Figure 2. Privacy preservation performance. (a) Handling s u m ( ) queries on temperature; (b) Handling m i n ( ) / m a x ( ) queries on temperature.
Sensors 17 00300 g002
Figure 3. Communication overhead for processing aggregation queries on different attributes. (a) For s u m ( ) queries; (b) For m i n ( ) / m a x ( ) queries.
Figure 3. Communication overhead for processing aggregation queries on different attributes. (a) For s u m ( ) queries; (b) For m i n ( ) / m a x ( ) queries.
Sensors 17 00300 g003
Figure 4. Aggregation accuracy for processing aggregation queries on different attributes. (a) For s u m ( ) queries; (b) For m i n ( ) / m a x ( ) queries.
Figure 4. Aggregation accuracy for processing aggregation queries on different attributes. (a) For s u m ( ) queries; (b) For m i n ( ) / m a x ( ) queries.
Sensors 17 00300 g004
Table 1. Notations table.
Table 1. Notations table.
NotationExplanation
nnumber of sensor nodes
v i the i-th sensor node, also denotes its ID
K i key shared by v i and the sink
P N i 1 , P N i 2 , , P N i m m pseudonyms the sink assign to v i
R ( K , t ) function each node use to generate pseudo random number
tsequence number of query
l e v e l ( v i ) v i ’s level in the ring
P r e d ( v i ) = { v j , v k , } set of v i ’s predecessors in the ring
S N ( v i ) number of v i ’s successors in the ring
h e a r ( v i ) number of packets v i hears from its successors
d i private data of v i
Ma constant satisfying M i = 1 n d i
c i noisy data integrated by v i
N L i set of the pseudonyms of the nodes who add noise into c i
m a x i v i ’s local maximum value
s o u r c e i source of m a x i in form of pseudonym
q b probability that a link is broken
P v ( q b ) probability that node v’s data is disclosed under the setting of q b
Table 2. Table maintained by the sink.
Table 2. Table maintained by the sink.
Node IDLocationKeyPseudonym 1 ... Pseudonym m
Table 3. Some detailed simulation results for handling s u m ( ) queries.
Table 3. Some detailed simulation results for handling s u m ( ) queries.
PerformanceAlgorithms
SMARTHEEPPHOMOENCRiPPAS
Privacy preservation (%) for q b = 0 . 01 0000
Privacy preservation (%) for q b = 0 . 05 0.120.1100.04
Privacy preservation (%) for q b = 0 . 1 0.50.4500.3
Communication overhead for s u m ( ) on temperature305222594156
Aggregation accuracy (%) for s u m ( ) on temperature84905584
Table 4. Some detailed simulation results for handling m i n ( ) / m a x ( ) queries.
Table 4. Some detailed simulation results for handling m i n ( ) / m a x ( ) queries.
PerformanceAlgorithms
RiPPAS_APBRiPPAS_RCUEADAT
Privacy preservation (%) for q b = 0 . 01 000.5
Privacy preservation (%) for q b = 0 . 05 00.022.8
Privacy preservation (%) for q b = 0 . 1 00.085.8
Communication overhead for m a x ( ) on temperature62109105
Aggregation accuracy (%) for s u m ( ) on temperature958261

Share and Cite

MDPI and ACS Style

Zhang, K.; Han, Q.; Cai, Z.; Yin, G. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks. Sensors 2017, 17, 300. https://doi.org/10.3390/s17020300

AMA Style

Zhang K, Han Q, Cai Z, Yin G. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks. Sensors. 2017; 17(2):300. https://doi.org/10.3390/s17020300

Chicago/Turabian Style

Zhang, Kejia, Qilong Han, Zhipeng Cai, and Guisheng Yin. 2017. "RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks" Sensors 17, no. 2: 300. https://doi.org/10.3390/s17020300

APA Style

Zhang, K., Han, Q., Cai, Z., & Yin, G. (2017). RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks. Sensors, 17(2), 300. https://doi.org/10.3390/s17020300

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop