The present work proposes an iot data aggregation framework for LPWANs that essentially considers the problem areas of energy consumption, data distortion, scalability, and security. The presented framework combines c...
详细信息
Aiming at providing a more rigorous data safeguard for the Internet of Things (iots), this paper initiates the study of privacy-preserving dataaggregation. We propose a "randomize-then-shuffle" paradigm, wh...
详细信息
ISBN:
(纸本)9798350311143
Aiming at providing a more rigorous data safeguard for the Internet of Things (iots), this paper initiates the study of privacy-preserving dataaggregation. We propose a "randomize-then-shuffle" paradigm, which can be generalized into a two-step procedure, that is, a noise addition step plus a random permutation step. More specially, we design an efficient randomizer, which carefully guides the data Contributors (DCs) to choose the privacy level and obfuscates the truth to ensure local differential privacy. Then, a shuffler is employed to receive the noisy data from all DCs. After that, it breaks the correct linkage between the senders and the receivers by applying a random permutation. Extensive simulations are provided to explore the privacy-utility landscape of our proposed paradigm.
The deployment of iot devices is gaining an expanding interest in our daily life. Indeed, iot networks consist in interconnecting several smart and resource constrained devices to enable advanced services. Security ma...
详细信息
ISBN:
(纸本)9783030026103;9783030026097
The deployment of iot devices is gaining an expanding interest in our daily life. Indeed, iot networks consist in interconnecting several smart and resource constrained devices to enable advanced services. Security management in iot is a big challenge as personal data are shared by a huge number of distributed services and devices. In this paper, we propose a Cooperative dataaggregation solution based on a novel use of Attribute Based signcryption scheme (Coop-DAAB). Coop-DAAB consists in distributing data signcryption operation between different participating entities (i.e., iot devices). Indeed, each iot device encrypts and signs in only one step the collected data with respect to a selected sub-predicate of a general access predicate before forwarding to an aggregating entity. This latter is able to aggregate and decrypt collected data if a sufficient number of iot devices cooperates without learning any personal information about each participating device. Thanks to the use of an attribute based signcryption scheme, authenticity of data collected by iot devices is proved while protecting them from any unauthorized access.
暂无评论