Abstract

In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.

Highlights

  • Wireless sensors, as an important carrier within a wireless sensor network, have several shortcomings including a potential for eavesdropping at nodes, limited energy, weak computing capacity, and a high probability of packet loss

  • In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving

  • As an important carrier within a wireless sensor network, have several shortcomings including a potential for eavesdropping at nodes, limited energy, weak computing capacity, and a high probability of packet loss

Read more

Summary

INTRODUCTION

As an important carrier within a wireless sensor network, have several shortcomings including a potential for eavesdropping at nodes, limited energy, weak computing capacity, and a high probability of packet loss. The data obtained by the sensors may face security threats such as being physically captured, attacked and tampered with by attackers, leading to leaking of private information, proposed by Fan et al (2012). This is an issue in important areas such as the military or medical field. While data privacy protection technology is to prevent attackers from eavesdropping on sensor nodes through the link layer to obtain effective information. The privacy protection protocols are effective in confronting monitoring, traffic analysis, data tampering, and replay attacks in wireless sensor networks.

RELATED WORK
Medium High Medium Medium Medium Low
Overall Operations
Source Node Operation
Transmission Node Operation
Format of the Frame
Variable Name B b N
Field Length
Data Reduction
HSC VN
Possibility of Restoring Complete Data
Impossible Possible Definite
Disturbing Data
SIMULATION AND PERFORMANCE ANALYSIS
Data Accuracy
Findings
Data Reduction Probability
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call