期刊文献+
共找到68篇文章
< 1 2 4 >
每页显示 20 50 100
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
1
作者 Congcong Wang Chen Wang +1 位作者 Wenying Zheng Wei Gu 《Computers, Materials & Continua》 SCIE EI 2025年第1期799-816,共18页
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and use... As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis. 展开更多
关键词 Smart grid data security privacy protection artificial intelligence data aggregation
在线阅读 下载PDF
Fuzzy Decision-Based Clustering for Efficient Data Aggregation in Mobile UWSNs
2
作者 Aadil Mushtaq Pandith Manni Kumar +5 位作者 Naveen Kumar Nitin Goyal Sachin Ahuja Yonis Gulzar Rashi Rastogi Rupesh Gupta 《Computers, Materials & Continua》 2025年第4期259-279,共21页
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the sink.However,many existing data aggregatio... Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the sink.However,many existing data aggregation techniques are designed exclusively for static networks and fail to reflect the dynamic nature of underwater environments.Additionally,conventional multi-hop data gathering techniques often lead to energy depletion problems near the sink,commonly known as the energy hole issue.Moreover,cluster-based aggregation methods face significant challenges such as cluster head(CH)failures and collisions within clusters that degrade overall network performance.To address these limitations,this paper introduces an innovative framework,the Cluster-based Data Aggregation using Fuzzy Decision Model(CDAFDM),tailored for mobile UWSNs.The proposed method has four main phases:clustering,CH selection,data aggregation,and re-clustering.During CH selection,a fuzzy decision model is utilized to ensure efficient cluster head selection based on parameters such as residual energy,distance to the sink,and data delivery likelihood,enhancing network stability and energy efficiency.In the aggregation phase,CHs transmit a single,consolidated set of non-redundant data to the base station(BS),thereby reducing data duplication and saving energy.To adapt to the changing network topology,the re-clustering phase periodically updates cluster formations and reselects CHs.Simulation results show that CDAFDM outperforms current protocols such as CAPTAIN(Collection Algorithm for underwater oPTical-AcoustIc sensor Networks),EDDG(Event-Driven Data Gathering),and DCBMEC(Data Collection Based on Mobile Edge Computing)with a packet delivery ratio increase of up to 4%,an energy consumption reduction of 18%,and a data collection latency reduction of 52%.These findings highlight the framework’s potential for reliable and energy-efficient data aggregation mobile UWSNs. 展开更多
关键词 CLUSTERING data aggregation data collection fuzzy model MONITORING UWSN
在线阅读 下载PDF
Efficient Data Aggregation and Message Transmission for Information Processing Model in the CPS-WSN
3
作者 Chao-Hsien Hsieh Qingqing Yang +2 位作者 Dehong Kong Fengya Xu Hongmei Wang 《Computers, Materials & Continua》 2025年第2期2869-2891,共23页
The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained... The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained devices. Their energy consumption is typically correlated with the amount of data collection. The purpose of data aggregation is to reduce data transmission, lower energy consumption, and reduce network congestion. For large-scale WSN, data aggregation can greatly improve network efficiency. However, as many heterogeneous data is poured into a specific area at the same time, it sometimes causes data loss and then results in incompleteness and irregularity of production data. This paper proposes an information processing model that encompasses the Energy-Conserving Data Aggregation Algorithm (ECDA) and the Efficient Message Reception Algorithm (EMRA). ECDA is divided into two stages, Energy conservation based on the global cost and Data aggregation based on ant colony optimization. The EMRA comprises the Polling Message Reception Algorithm (PMRA), the Shortest Time Message Reception Algorithm (STMRA), and the Specific Condition Message Reception Algorithm (SCMRA). These algorithms are not only available for the regularity and directionality of sensor information transmission, but also satisfy the different requirements in small factory environments. To compare with the recent HPSO-ILEACH and E-PEGASIS, DCDA can effectively reduce energy consumption. Experimental results show that STMRA consumes 1.3 times the time of SCMRA. Both optimization algorithms exhibit higher time efficiency than PMRA. Furthermore, this paper also evaluates these three algorithms using AHP. 展开更多
关键词 WSN-CPS assembly line message transmission data aggregation energy conservation
在线阅读 下载PDF
Data Aggregation Point Placement and Subnetwork Optimization for Smart Grids
4
作者 Tien-Wen Sung Wei Li +2 位作者 Chao-Yang Lee Yuzhen Chen Qingjun Fang 《Computers, Materials & Continua》 2025年第4期407-434,共28页
To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the SM.The number of DAPs installed and the installa... To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the SM.The number of DAPs installed and the installation location greatly impact the whole network.For the traditional DAP placement algorithm,the number of DAPs must be set in advance,but determining the best number of DAPs is difficult,which undoubtedly reduces the overall performance of the network.Moreover,the excessive gap between the loads of different DAPs is also an important factor affecting the quality of the network.To address the above problems,this paper proposes a DAP placement algorithm,APSSA,based on the improved affinity propagation(AP)algorithm and sparrow search(SSA)algorithm,which can select the appropriate number of DAPs to be installed and the corresponding installation locations according to the number of SMs and their distribution locations in different environments.The algorithm adds an allocation mechanism to optimize the subnetwork in the SSA.APSSA is evaluated under three different areas and compared with other DAP placement algorithms.The experimental results validated that the method in this paper can reduce the network cost,shorten the average transmission distance,and reduce the load gap. 展开更多
关键词 Smart grid data aggregation point placement network cost average transmission distance load gap
在线阅读 下载PDF
Homomorphic Integrity and Confidentiality Protection for Data Aggregation in the Digital Twin Environment with High Efficiency
5
作者 Yan Xincheng Wan Changsheng +3 位作者 Bao Zhenjie Li Pei Hou Kangxin Chen Haitao 《China Communications》 2025年第10期101-117,共17页
Digital twin is a novel technology that has achieved significant progress in industrial manufactur-ing systems in recent years.In the digital twin envi-ronment,entities in the virtual space collect data from devices i... Digital twin is a novel technology that has achieved significant progress in industrial manufactur-ing systems in recent years.In the digital twin envi-ronment,entities in the virtual space collect data from devices in the physical space to analyze their states.However,since a lot of devices exist in the physical space,the digital twin system needs to aggregate data from multiple devices at the edge gateway.Homomor-phic integrity and confidentiality protections are two important requirements for this data aggregation pro-cess.Unfortunately,existing homomorphic encryp-tion algorithms do not support integrity protection,and existing homomorphic signing algorithms require all signers to use the same signing key,which is not feasible in the digital twin environment.Moreover,for both integrity and confidentiality protections,the homomorphic signing algorithm must be compatible with the aggregation manner of the homomorphic en-cryption algorithm.To address these issues,this paper designs a novel homomorphic aggregation scheme,which allows multiple devices in the physical space to sign different data using different keys and support in-tegrity and confidentiality protections.Finally,the security of the newly designed scheme is analyzed,and its efficiency is evaluated.Experimental results show that our scheme is feasible for real world applications. 展开更多
关键词 data aggregation digital twin homomorphic encryption homomorphic integrity protection
在线阅读 下载PDF
Optimizing data aggregation and clustering in Internet of things networks using principal component analysis and Q-learning 被引量:1
6
作者 Abhishek Bajpai Harshita Verma Anita Yadav 《Data Science and Management》 2024年第3期189-196,共8页
The Internet of things(IoT)is a wireless network designed to perform specific tasks and plays a crucial role in various fields such as environmental monitoring,surveillance,and healthcare.To address the limitations im... The Internet of things(IoT)is a wireless network designed to perform specific tasks and plays a crucial role in various fields such as environmental monitoring,surveillance,and healthcare.To address the limitations imposed by inadequate resources,energy,and network scalability,this type of network relies heavily on data aggregation and clustering algorithms.Although various conventional studies have aimed to enhance the lifespan of a network through robust systems,they do not always provide optimal efficiency for real-time applications.This paper presents an approach based on state-of-the-art machine-learning methods.In this study,we employed a novel approach that combines an extended version of principal component analysis(PCA)and a reinforcement learning algorithm to achieve efficient clustering and data reduction.The primary objectives of this study are to enhance the service life of a network,reduce energy usage,and improve data aggregation efficiency.We evaluated the proposed methodology using data collected from sensors deployed in agricultural fields for crop monitoring.Our proposed approach(PQL)was compared to previous studies that utilized adaptive Q-learning(AQL)and regional energy-aware clustering(REAC).Our study outperformed in terms of both network longevity and energy consumption and established a fault-tolerant network. 展开更多
关键词 Wireless sensor network Principal component analysis(PCA) Reinforcement learning data aggregation
在线阅读 下载PDF
An efficient data aggregation scheme with local differential privacy in smart grid 被引量:7
7
作者 Na Gai Kaiping Xue +3 位作者 Bin Zhu Jiayu Yang Jianqing Liu Debiao He 《Digital Communications and Networks》 SCIE CSCD 2022年第3期333-342,共10页
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the smart grid collect the users' power usage data on a regular basis and upload it to the control center to complete the smart grid data acquisition. The control center can evaluate the supply and demand of the power grid through aggregated data from users and then dynamically adjust the power supply and price, etc. However, since the grid data collected from users may disclose the user's electricity usage habits and daily activities, privacy concern has become a critical issue in smart grid data aggregation. Most of the existing privacy-preserving data collection schemes for smart grid adopt homomorphic encryption or randomization techniques which are either impractical because of the high computation overhead or unrealistic for requiring a trusted third party. 展开更多
关键词 Local differential privacy data aggregation Smart grid Privacy preserving
在线阅读 下载PDF
Data Aggregation Scheduling with Guaranteed Lifetime and Efficient Latency in Wireless Sensor Networks 被引量:4
8
作者 Chen Zhengyu Yang Geng +3 位作者 Chen Lei Xu Jian Wang Haiyong Yang Zhen 《China Communications》 SCIE CSCD 2012年第9期11-21,共11页
In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggrega... In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaran- teed lifetime and efficient latency in WSNs. We first Construct a Guaranteed Lifetime Mininmm Ra- dius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while pro- viding a guaranteed network lifetime, and then de-sign a Greedy Scheduling algorithM (GSM) based on finding the nmzximum independent set in conflict graph to schedule he transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperfonm the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetilre. 展开更多
关键词 WSNs data aggregation aggregationscheduling network lifetime LATENCY
在线阅读 下载PDF
A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks 被引量:4
9
作者 XU Jian YANG Geng +1 位作者 CHEN Zhengyu WANG Qianqian 《China Communications》 SCIE CSCD 2015年第5期162-180,共19页
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to s... Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to substantially reduce the communication overhead and energy expenditure of sensor node during the process of data collection in a WSNs.However,privacy-preservation is more challenging especially in data aggregation,where the aggregators need to perform some aggregation operations on sensing data it received.We present a state-of-the art survey of privacy-preserving data aggregation in WSNs.At first,we classify the existing privacy-preserving data aggregation schemes into different categories by the core privacy-preserving techniques used in each scheme.And then compare and contrast different algorithms on the basis of performance measures such as the privacy protection ability,communication consumption,power consumption and data accuracy etc.Furthermore,based on the existing work,we also discuss a number of open issues which may intrigue the interest of researchers for future work. 展开更多
关键词 wireless sensor networks data aggregation PRIVACY-PRESERVING
在线阅读 下载PDF
An Efficient and Privacy-Preserving Data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT 被引量:2
10
作者 Haihui Liu Jianwei Chen +2 位作者 Liwei Lin Ayong Ye Chuan Huang 《China Communications》 SCIE CSCD 2022年第6期91-104,共14页
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our lifestyle.The terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to... The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our lifestyle.The terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve intelligent decisions.However,the high frequency of collecting user data will raise people concerns about personal privacy.In recent years,many privacy-preserving data aggregation schemes have been proposed.Unfortunately,most existing schemes cannot support either arbitrary aggregation functions,or dynamic user group management,or fault tolerance.In this paper,we propose an efficient and privacy-preserving data aggregation scheme.In the scheme,we design a lightweight encryption method to protect the user privacy by using a ring topology and a random location sequence.On this basis,the proposed scheme supports not only arbitrary aggregation functions,but also flexible dynamic user management.Furthermore,the scheme achieves faulttolerant capabilities by utilizing a future data buffering mechanism.Security analysis reveals that the scheme can achieve the desired security properties,and experimental evaluation results show the scheme's efficiency in terms of computational and communication overhead. 展开更多
关键词 Internet of Things data aggregation privacy protection arbitrary aggregation functions
在线阅读 下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
11
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
在线阅读 下载PDF
A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing 被引量:1
12
作者 Shuyu Li Guozheng Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第4期223-241,共19页
With the popularity of sensor-rich mobile devices,mobile crowdsensing(MCS)has emerged as an effective method for data collection and processing.However,MCS platform usually need workers’precise locations for optimal ... With the popularity of sensor-rich mobile devices,mobile crowdsensing(MCS)has emerged as an effective method for data collection and processing.However,MCS platform usually need workers’precise locations for optimal task execution and collect sensing data from workers,which raises severe concerns of privacy leakage.Trying to preserve workers’location and sensing data from the untrusted MCS platform,a differentially private data aggregation method based on worker partition and location obfuscation(DP-DAWL method)is proposed in the paper.DP-DAWL method firstly use an improved K-means algorithm to divide workers into groups and assign different privacy budget to the group according to group size(the number of workers).Then each worker’s location is obfuscated and his/her sensing data is perturbed by adding Laplace noise before uploading to the platform.In the stage of data aggregation,DP-DAWL method adopts an improved Kalman filter algorithm to filter out the added noise(including both added noise of sensing data and the system noise in the sensing process).Through using optimal estimation of noisy aggregated sensing data,the platform can finally gain better utility of aggregated data while preserving workers’privacy.Extensive experiments on the synthetic datasets demonstrate the effectiveness of the proposed method. 展开更多
关键词 Mobile crowdsensing data aggregation differential privacy K-MEANS kalman filter
在线阅读 下载PDF
A Path-Based Approach for Data Aggregation in Grid-Based Wireless Sensor Networks 被引量:1
13
作者 Neng-Chung Wang Yung-Kuei Chiang Chih-Hung Hsieh 《Journal of Electronic Science and Technology》 CAS 2014年第3期313-317,共5页
Sensor nodes in a wireless sensor network (WSN) are typically powered by batteries, thus the energy is constrained. It is our design goal to efficiently utilize the energy of each sensor node to extend its lifetime,... Sensor nodes in a wireless sensor network (WSN) are typically powered by batteries, thus the energy is constrained. It is our design goal to efficiently utilize the energy of each sensor node to extend its lifetime, so as to prolong the lifetime of the whole WSN. In this paper, we propose a path-based data aggregation scheme (PBDAS) for grid-based wireless sensor networks. In order to extend the lifetime of a WSN, we construct a grid infrastructure by partitioning the whole sensor field into a grid of cells. Each cell has a head responsible for aggregating its own data with the data sensed by the others in the same cell and then transmitting out. In order to efficiently and rapidly transmit the data to the base station (BS), we link each cell head to form a chain. Each cell head on the chain takes turn becoming the chain leader responsible for transmitting data to the BS. Aggregated data moves from head to head along the chain, and finally the chain leader transmits to the BS. In PBDAS, only the cell heads need to transmit data toward the BS. Therefore, the data transmissions to the BS substantially decrease. Besides, the cell heads and chain leader are designated in turn according to the energy level so that the energy depletion of nodes is evenly distributed. Simulation results show that the proposed PBDAS extends the lifetime of sensor nodes, so as to make the lifetime of the whole network longer. 展开更多
关键词 Base station cell head data aggregation grid-based wireless sensor networks
在线阅读 下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
14
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
在线阅读 下载PDF
Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit 被引量:1
15
作者 Yifei ZOU Senmao QI +1 位作者 Cong'an XU Dongxiao YU 《计算机科学》 CSCD 北大核心 2023年第2期13-22,共10页
As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ... As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm. 展开更多
关键词 Weighted data aggregation End-to-edge communication Multi-armed bandit Edge intelligence
在线阅读 下载PDF
Injury severity analysis: comparison of multilevel logistic regression models and effects of collision data aggregation 被引量:1
16
作者 Taimur Usman Liping Fu Luis F.Miranda-Moreno 《Journal of Modern Transportation》 2016年第1期73-87,共15页
This paper describes an empirical study aiming at identifying the main differences between different logistic regression models and collision data aggregation methods that are commonly applied in road safety literatur... This paper describes an empirical study aiming at identifying the main differences between different logistic regression models and collision data aggregation methods that are commonly applied in road safety literature for modeling collision severity. In particular, the research compares three popular multilevel logistic models (i.e., sequential binary logit models, ordered logit models, and multinomial logit models) as well as three data aggregation methods (i.e., occupant based, vehicle based, and collision based). Six years of collision data (2001-2006) from 31 highway routes from across the province of Ontario, Canada were used for this analysis. It was found that a multilevel multinomial logit model has the best fit to the data than the other two models while the results obtained from occupant-based data are more reliable than those from vehicle- and collision-based data. More importantly, while generally consistent in terms of factors that were found to be significant between different models and data aggregation methods, the effect size of each factor differ sub- stantially, which could have significant implications forevaluating the effects of different safety-related policies and countermeasures. 展开更多
关键词 Injury severity - Multilevel logistic regressionmodels Collision data aggregation
在线阅读 下载PDF
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN 被引量:1
17
作者 Mohanbabu Gopalakrishnan Gopi Saminathan Arumugam +1 位作者 Karthigai Lakshmi Shanmuga Vel 《Circuits and Systems》 2016年第8期1404-1420,共17页
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the... Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique. 展开更多
关键词 data aggregation False data Injection Attacks Malicious Nodes One-Time Key Generation Secure One-Time (SOT) Key and Wireless Sensor Networks (WSNs)
在线阅读 下载PDF
PVF-DA: Privacy-Preserving, Verifiable and FaultTolerant Data Aggregation in MEC
18
作者 Jianhong Zhang Qijia Zhang +1 位作者 Shenglong Ji Wenle Bai 《China Communications》 SCIE CSCD 2020年第8期58-69,共12页
As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, d... As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, data aggregation is a good candidate. However, data processing in MEC may suffer from many challenges, such as unverifiability of aggregated data, privacy-violation and fault-tolerance. To address these challenges, we propose PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC based on aggregator-oblivious encryption and zero-knowledge-proof. The proposed scheme can not only provide privacy protection of the reported data, but also resist the collusion between MEC server and corrupted Io T devices. Furthermore, the proposed scheme has two outstanding features: verifiability and strong fault-tolerance. Verifiability can make Io T device to verify whether the reported sensing data is correctly aggregated. Strong fault-tolerance makes the aggregator to compute an aggregate even if one or several Io Ts fail to report their data. Finally, the detailed security proofs are shown that the proposed scheme can achieve security and privacy-preservation properties in MEC. 展开更多
关键词 MEC data aggregation verifiability PRIVACY-PRESERVING FAULT-TOLERANCE
在线阅读 下载PDF
Green Architecture for Dense Home Area Networks Based on Radio-over-Fiber with Data Aggregation Approach
19
作者 Mohd Sharil Abdullah Mohd Adib Sarijari +4 位作者 Abdul Hadi Fikri Abdul Hamid Norsheila Fisal Anthony Lo Rozeha A.Rashid Sharifah Kamilah Syed Yusof 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第2期133-144,共12页
The high-density population leads to crowded cities. The future city is envisaged to encompass a large-scale network with diverse applications and a massive number of interconnected heterogeneous wireless-enabled devi... The high-density population leads to crowded cities. The future city is envisaged to encompass a large-scale network with diverse applications and a massive number of interconnected heterogeneous wireless-enabled devices. Hence, green technology elements are crucial to design sustainable and future-proof network architectures. They are the solutions for spectrum scarcity, high latency, interference, energy efficiency, and scalability that occur in dense and heterogeneous wireless networks especially in the home area network (HAN). Radio-over-fiber (ROF) is a technology candidate to provide a global view of HAN's activities that can be leveraged to allocate orthogonal channel communications for enabling wireless-enabled HAN devices transmission, with considering the clustered-frequency-reuse approach. Our proposed network architecture design is mainly focused on enhancing the network throughput and reducing the average network communications latency by proposing a data aggregation unit (DAU). The performance shows that with the DAU, the average network communications latency reduces significantly while the network throughput is enhanced, compared with the existing ROF architecture without the DAU. 展开更多
关键词 data aggregation unit dense homearea network green architecture heterogeneousnetwork radio-over-fiber.
在线阅读 下载PDF
An Energy-Efficient Mobile Agent-Based Data Aggregation Scheme for Wireless Body Area Networks
20
作者 Gulzar Mehmood Muhammad Zahid Khan +3 位作者 Muhammad Fayaz Mohammad Faisal Haseeb Ur Rahman Jeonghwan Gwak 《Computers, Materials & Continua》 SCIE EI 2022年第3期5929-5948,共20页
Due to the advancement in wireless technology and miniaturization,Wireless Body Area Networks(WBANs)have gained enormous popularity,having various applications,especially in the healthcare sector.WBANs are intrinsical... Due to the advancement in wireless technology and miniaturization,Wireless Body Area Networks(WBANs)have gained enormous popularity,having various applications,especially in the healthcare sector.WBANs are intrinsically resource-constrained;therefore,they have specific design and development requirements.One such highly desirable requirement is an energy-efficient and reliable Data Aggregation(DA)mechanism for WBANs.The efficient and reliableDAmay ultimately push the network to operate without much human intervention and further extend the network lifetime.The conventional client-serverDAparadigm becomes unsuitable and inefficient for WBANs when a large amount of data is generated in the network.Similarly,in most of the healthcare applications(patient’s critical conditions),it is highly important and required to send data as soon as possible;therefore,reliable data aggregation in WBANs is of great concern.To tackle the shortcomings of the client-serverDAparadigm,theMobile Agent-Basedmechanismproved to be a more workable solution.In aMobile Agent-Based mechanism,a taskspecific mobile agent(code)traverses to the intended sources to gather data.Thesemobile agents travel on a predefined path called itinerary;however,planning a suitable and reliable itinerary for a mobile agent is also a challenging issue inWBANs.This paper presents a new Mobile Agent-Based DA scheme for WBANs,which is energy-efficient and reliable.Firstly,in the proposed scheme,the network is divided into clusters,and cluster-heads are selected.Secondly,a mobile agent is generated from the base station to collect the required data from cluster heads.In the case,if any fault occurs in the existing itinerary,an alternate itinerary is planned in real-time without compromising the network performance.In our simulation-based validation,we have found that the proposed system delivers significantly improved fault-tolerance and reliability with energy-efficiency and extended network lifetime in WBANs. 展开更多
关键词 WBANs mobile-agent data aggregation RELIABILITY
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部