期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit 被引量:1
1
作者 Yifei ZOU Senmao QI +1 位作者 Cong'an XU Dongxiao YU 《计算机科学》 CSCD 北大核心 2023年第2期13-22,共10页
As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ... As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm. 展开更多
关键词 Weighted data aggregation End-to-edge communication Multi-armed bandit Edge intelligence
下载PDF
Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT
2
作者 S.Siamala Devi K.Venkatachalam +1 位作者 Yunyoung Nam Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1869-1880,共12页
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient ... The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient life.The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things(IoT),Wireless Sensor Networks(WSN),Embedded systems,Deep learning approaches and Optimization and aggregation methods.The data generated through these technologies will demand the bandwidth,data rate,latency of the network.In this proposed work,efficient discrete grey wolf optimization(DGWO)based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code(ECEMAC)has been used to aggregate the parameters generated from the wearable sensor devices of the patient.The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO.Aggregation scheme will reduce the number of transmissions over the network.The aggregated data are preprocessed at edge node to remove the noise for better diagnosis.Edge node will reduce the overhead of cloud server.The aggregated data are forward to cloud server for central storage and diagnosis.This proposed smart diagnosis will reduce the transmission cost through aggrega-tion scheme which will reduce the energy of the system.Energy cost for proposed system for 300 nodes is 0.34μJ.Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme(SPPDA),concealed data aggregation scheme for multiple application(CDAMA)and secure aggregation scheme(ASAS)are 1.3μJ,0.81μJ and 0.51μJ respectively.The optimization approaches and encryption method will ensure the data privacy. 展开更多
关键词 Discrete grey wolf optimization data aggregation cloud computing IOT WSN smart healthcare elliptic curve elgamal energy optimization
下载PDF
Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks
3
作者 Dae-Young Kim Seokhoon Kim 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期727-737,共11页
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t... As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach. 展开更多
关键词 data aggregation data transmission ultra-dense network machine-type communication Internet of Things
下载PDF
Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment
4
作者 P.Nalayini R.Arun Prakash 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2033-2047,共15页
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)services.After the emerg... Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)services.After the emergence of IoT-based services,the industry of internet-based devices has grown.The number of these devices has raised from millions to billions,and it is expected to increase further in the near future.Thus,additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user experience.Conventional data aggregation models for Fog enabled IoT environ-ments possess high computational complexity and communication cost.There-fore,in order to resolve the issues and improve the lifetime of the network,this study develops an effective hierarchical data aggregation with chaotic barnacles mating optimizer(HDAG-CBMO)technique.The HDAG-CBMO technique derives afitness function from many relational matrices,like residual energy,average distance to neighbors,and centroid degree of target area.Besides,a chaotic theory based population initialization technique is derived for the optimal initial position of barnacles.Moreover,a learning based data offloading method has been developed for reducing the response time to IoT user requests.A wide range of simulation analyses demonstrated that the HDAG-CBMO technique has resulted in balanced energy utilization and prolonged lifetime of the Fog assisted IoT networks. 展开更多
关键词 Internet of things fog computing barnacles mating optimizer data offloading data aggregation
下载PDF
An Efficient and Privacy-Preserving Data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT 被引量:1
5
作者 Haihui Liu Jianwei Chen +2 位作者 Liwei Lin Ayong Ye Chuan Huang 《China Communications》 SCIE CSCD 2022年第6期91-104,共14页
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our lifestyle.The terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to... The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our lifestyle.The terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve intelligent decisions.However,the high frequency of collecting user data will raise people concerns about personal privacy.In recent years,many privacy-preserving data aggregation schemes have been proposed.Unfortunately,most existing schemes cannot support either arbitrary aggregation functions,or dynamic user group management,or fault tolerance.In this paper,we propose an efficient and privacy-preserving data aggregation scheme.In the scheme,we design a lightweight encryption method to protect the user privacy by using a ring topology and a random location sequence.On this basis,the proposed scheme supports not only arbitrary aggregation functions,but also flexible dynamic user management.Furthermore,the scheme achieves faulttolerant capabilities by utilizing a future data buffering mechanism.Security analysis reveals that the scheme can achieve the desired security properties,and experimental evaluation results show the scheme's efficiency in terms of computational and communication overhead. 展开更多
关键词 Internet of Things data aggregation privacy protection arbitrary aggregation functions
下载PDF
An efficient data aggregation scheme with local differential privacy in smart grid 被引量:1
6
作者 Na Gai Kaiping Xue +3 位作者 Bin Zhu Jiayu Yang Jianqing Liu Debiao He 《Digital Communications and Networks》 SCIE CSCD 2022年第3期333-342,共10页
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the smart grid collect the users' power usage data on a regular basis and upload it to the control center to complete the smart grid data acquisition. The control center can evaluate the supply and demand of the power grid through aggregated data from users and then dynamically adjust the power supply and price, etc. However, since the grid data collected from users may disclose the user's electricity usage habits and daily activities, privacy concern has become a critical issue in smart grid data aggregation. Most of the existing privacy-preserving data collection schemes for smart grid adopt homomorphic encryption or randomization techniques which are either impractical because of the high computation overhead or unrealistic for requiring a trusted third party. 展开更多
关键词 Local differential privacy data aggregation Smart grid Privacy preserving
下载PDF
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN 被引量:1
7
作者 Mohanbabu Gopalakrishnan Gopi Saminathan Arumugam +1 位作者 Karthigai Lakshmi Shanmuga Vel 《Circuits and Systems》 2016年第8期1404-1420,共17页
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the... Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique. 展开更多
关键词 data aggregation False data Injection Attacks Malicious Nodes One-Time Key Generation Secure One-Time (SOT) Key and Wireless Sensor Networks (WSNs)
下载PDF
PVF-DA: Privacy-Preserving, Verifiable and FaultTolerant Data Aggregation in MEC
8
作者 Jianhong Zhang Qijia Zhang +1 位作者 Shenglong Ji Wenle Bai 《China Communications》 SCIE CSCD 2020年第8期58-69,共12页
As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, d... As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, data aggregation is a good candidate. However, data processing in MEC may suffer from many challenges, such as unverifiability of aggregated data, privacy-violation and fault-tolerance. To address these challenges, we propose PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC based on aggregator-oblivious encryption and zero-knowledge-proof. The proposed scheme can not only provide privacy protection of the reported data, but also resist the collusion between MEC server and corrupted Io T devices. Furthermore, the proposed scheme has two outstanding features: verifiability and strong fault-tolerance. Verifiability can make Io T device to verify whether the reported sensing data is correctly aggregated. Strong fault-tolerance makes the aggregator to compute an aggregate even if one or several Io Ts fail to report their data. Finally, the detailed security proofs are shown that the proposed scheme can achieve security and privacy-preservation properties in MEC. 展开更多
关键词 MEC data aggregation verifiability PRIVACY-PRESERVING FAULT-TOLERANCE
下载PDF
A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing
9
作者 Shuyu Li Guozheng Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第4期223-241,共19页
With the popularity of sensor-rich mobile devices,mobile crowdsensing(MCS)has emerged as an effective method for data collection and processing.However,MCS platform usually need workers’precise locations for optimal ... With the popularity of sensor-rich mobile devices,mobile crowdsensing(MCS)has emerged as an effective method for data collection and processing.However,MCS platform usually need workers’precise locations for optimal task execution and collect sensing data from workers,which raises severe concerns of privacy leakage.Trying to preserve workers’location and sensing data from the untrusted MCS platform,a differentially private data aggregation method based on worker partition and location obfuscation(DP-DAWL method)is proposed in the paper.DP-DAWL method firstly use an improved K-means algorithm to divide workers into groups and assign different privacy budget to the group according to group size(the number of workers).Then each worker’s location is obfuscated and his/her sensing data is perturbed by adding Laplace noise before uploading to the platform.In the stage of data aggregation,DP-DAWL method adopts an improved Kalman filter algorithm to filter out the added noise(including both added noise of sensing data and the system noise in the sensing process).Through using optimal estimation of noisy aggregated sensing data,the platform can finally gain better utility of aggregated data while preserving workers’privacy.Extensive experiments on the synthetic datasets demonstrate the effectiveness of the proposed method. 展开更多
关键词 Mobile crowdsensing data aggregation differential privacy K-MEANS kalman filter
下载PDF
An Energy-Efficient Mobile Agent-Based Data Aggregation Scheme for Wireless Body Area Networks
10
作者 Gulzar Mehmood Muhammad Zahid Khan +3 位作者 Muhammad Fayaz Mohammad Faisal Haseeb Ur Rahman Jeonghwan Gwak 《Computers, Materials & Continua》 SCIE EI 2022年第3期5929-5948,共20页
Due to the advancement in wireless technology and miniaturization,Wireless Body Area Networks(WBANs)have gained enormous popularity,having various applications,especially in the healthcare sector.WBANs are intrinsical... Due to the advancement in wireless technology and miniaturization,Wireless Body Area Networks(WBANs)have gained enormous popularity,having various applications,especially in the healthcare sector.WBANs are intrinsically resource-constrained;therefore,they have specific design and development requirements.One such highly desirable requirement is an energy-efficient and reliable Data Aggregation(DA)mechanism for WBANs.The efficient and reliableDAmay ultimately push the network to operate without much human intervention and further extend the network lifetime.The conventional client-serverDAparadigm becomes unsuitable and inefficient for WBANs when a large amount of data is generated in the network.Similarly,in most of the healthcare applications(patient’s critical conditions),it is highly important and required to send data as soon as possible;therefore,reliable data aggregation in WBANs is of great concern.To tackle the shortcomings of the client-serverDAparadigm,theMobile Agent-Basedmechanismproved to be a more workable solution.In aMobile Agent-Based mechanism,a taskspecific mobile agent(code)traverses to the intended sources to gather data.Thesemobile agents travel on a predefined path called itinerary;however,planning a suitable and reliable itinerary for a mobile agent is also a challenging issue inWBANs.This paper presents a new Mobile Agent-Based DA scheme for WBANs,which is energy-efficient and reliable.Firstly,in the proposed scheme,the network is divided into clusters,and cluster-heads are selected.Secondly,a mobile agent is generated from the base station to collect the required data from cluster heads.In the case,if any fault occurs in the existing itinerary,an alternate itinerary is planned in real-time without compromising the network performance.In our simulation-based validation,we have found that the proposed system delivers significantly improved fault-tolerance and reliability with energy-efficiency and extended network lifetime in WBANs. 展开更多
关键词 WBANs mobile-agent data aggregation RELIABILITY
下载PDF
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
11
作者 Weidong Fang Wuxiong Zhang +3 位作者 QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《Computers, Materials & Continua》 SCIE EI 2019年第8期583-599,共17页
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco... As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN. 展开更多
关键词 Industrial wireless sensor network wireless sensor network cyber security secure data aggregation protocol
下载PDF
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid
12
作者 Hongyang LI Xinghua LI Qingfeng CHENG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期187-198,共12页
Compared with the traditional power grid,smart grid involves many advanced technologies and applications.However,due to the rapid development of various network technologies,smart grid is facing the challenges of bala... Compared with the traditional power grid,smart grid involves many advanced technologies and applications.However,due to the rapid development of various network technologies,smart grid is facing the challenges of balancing privacy,security,efficiency,and functionality.In the proposed scheme,we design a privacy protection scheme for outsourcing smart grid aided by fog computing,which supports fine-grained privacy-protected data aggregation based on user characteristics.The fog server matches the encrypted characteristics in the received message with the encrypted aggregation rules issued by the service provider.Therefore,the service provider can get more fine-grained analysis data based on user characteristics.Different from the existing outsourcing smart grid schemes,the proposed scheme can achieve real-time pricing on the premise of protecting user privacy and achieving system fault tolerance.Finally,experiment analyses demonstrate that the proposed scheme has less computation overhead and lower transmission delay than existing schemes. 展开更多
关键词 smart grid data aggregation FINE-GRAINED privacy preservation real-time pricing
原文传递
EPMDA:an efficient privacy-preserving multi-dimensional data aggregation scheme for edge computing-based IoT system 被引量:1
13
作者 Tao Yunting Kong Fanyu Yu Jia 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第6期26-35,共10页
In order to perform multi-dimensional data aggregation operations efficiently in edge computing-based Internet of things(IoT) systems, a new efficient privacy-preserving multi-dimensional data aggregation(EPMDA) schem... In order to perform multi-dimensional data aggregation operations efficiently in edge computing-based Internet of things(IoT) systems, a new efficient privacy-preserving multi-dimensional data aggregation(EPMDA) scheme is proposed in this paper. EPMDA scheme is characterized by employing the homomorphic Paillier encryption and SM9 signature algorithm. To improve the computation efficiency of the Paillier encryption operation, EPMDA scheme generates a pre-computed modular exponentiation table of each dimensional data, and the Paillier encryption operation can be implemented by using only several modular multiplications. For the multi-dimensional data, the scheme concatenates zeros between two adjacent dimensional data to avoid data overflow in the sum operation of ciphertexts. To enhance security, EPMDA scheme sets random number at the high address of the exponent. Moreover, the scheme utilizes SM9 signature scheme to guarantee device authentication and data integrity. The performance evaluation and comparison show that EPMDA scheme is more efficient than the existing multi-dimensional data aggregation schemes. 展开更多
关键词 multi-dimensional data aggregation Paillier cryptosystem Internet of things(IoT) edge computing-based
原文传递
MSDA:multi-subset data aggregation scheme without trusted third party
14
作者 Zhixin ZENG Xiaodi WANG +1 位作者 Yining LIU Liang CHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第1期135-141,共7页
Data aggregation has been widely researched to address the privacy concern when data is published,meanwhile,data aggregation only obtains the sum or average in an area.In reality,more fine-grained data brings more val... Data aggregation has been widely researched to address the privacy concern when data is published,meanwhile,data aggregation only obtains the sum or average in an area.In reality,more fine-grained data brings more value for data consumers,such as more accurate management,dynamic price-adjusting in the grid system,etc.In this paper,a multi-subset data aggregation scheme for the smart grid is proposed without a trusted third party,in which the control center collects the number of users in different subsets,and obtains the sum of electricity consumption in each subset,meantime individual user’s data privacy is still preserved.In addition,the dynamic and flexible user management mechanism is guaranteed with the secret key negotiation process among users.The analysis shows MSDA not only protects users’privacy to resist various attacks but also achieves more functionality such as multi-subset aggregation,no reliance on any trusted third party,dynamicity.And performance evaluation demonstrates that MSDA is efficient and practical in terms of communication and computation overhead. 展开更多
关键词 multi-subset data aggregation PRIVACY-PRESERVING smart gird dynamic user management
原文传递
A distributed routing algorithm for data aggregation in wireless sensor networks
15
作者 Hong LUO Fangchun YANG Yonghe LIU 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2008年第1期34-39,共6页
Considering the impact of aggregation cost on the performance of aggregation routes in wireless sensor networks,an aggregation-decision-based distributed routing algorithm for data aggregation is proposed.When source ... Considering the impact of aggregation cost on the performance of aggregation routes in wireless sensor networks,an aggregation-decision-based distributed routing algorithm for data aggregation is proposed.When source nodes arrive or leave,the algorithm can calculate the aggregation benefit according to data correlation,aggregation cost and transmission cost.Then the algo-rithm will adaptively make aggregation and routing decisions based on aggregation benefit.Therefore,it can jointly optimize the aggregation and transmission costs and reduce the energy consumption for data gathering.This distributed algorithm makes all the decisions only relying on the local information.Hence,the routing maintenance cost is limited.Simula tion results show that the energy consumption difference between this distributed online algorithm and the previous offline one is within 17%under any network conditions. 展开更多
关键词 wireless sensor networks data gathering data aggregation ROUTING
原文传递
Efficient Packet Scheduling Technique for Data Merging in Wireless Sensor Networks 被引量:2
16
作者 V.Akila T.Sheela G.Adiline Macriga 《China Communications》 SCIE CSCD 2017年第4期35-46,共12页
Wireless Sensor Networks(WSNs) has become a popular research topic due to its resource constraints. Energy consumption and transmission delay is crucial requirement to be handled to enhance the popularity of WSNs. In ... Wireless Sensor Networks(WSNs) has become a popular research topic due to its resource constraints. Energy consumption and transmission delay is crucial requirement to be handled to enhance the popularity of WSNs. In order to overcome these issues, we have proposed an Efficient Packet Scheduling Technique for Data Merging in WSNs. Packet scheduling is done by using three levels of priority queue and to reduce the transmission delay. Real-time data packets are placed in high priority queue and Non real-time data packets based on local or remote data are placed on other queues. In this paper, we have used Time Division Multiple Access(TDMA) scheme to efficiently determine the priority of the packet at each level and transmit the data packets from lower level to higher level through intermediate nodes. To reduce the number of transmission, efficient data merge technique is used to merge the data packet in intermediate nodes which has same destination node. Data merge utilize the maximum packet size by appending the merged packets with received packets till the maximum packet size or maximum waiting time is reached. Real-time data packets are directly forwarded to the next node without applying data merge. The performance is evaluated under various metrics like packet delivery ratio, packet drop, energy consumption and delay based on changing the number of nodes and transmission rate. Our results show significant reduction in various performance metrics. 展开更多
关键词 wireless sensor networks data aggregation packet scheduling time division multiple access
下载PDF
NLDA non-linear regression model for preserving data privacy in wireless sensor networks 被引量:1
17
作者 A.L.Sreenivasulu P.Chenna Reddy 《Digital Communications and Networks》 SCIE 2020年第1期101-107,共7页
Recently,the application of Wireless Sensor Networks(WSNs)has been increasing rapidly.It requires privacy preserving data aggregation protocols to secure the data from compromises.Preserving privacy of the sensor data... Recently,the application of Wireless Sensor Networks(WSNs)has been increasing rapidly.It requires privacy preserving data aggregation protocols to secure the data from compromises.Preserving privacy of the sensor data is a challenging task.This paper presents a non-linear regression-based data aggregation protocol for preserving privacy of the sensor data.The proposed protocol uses non-linear regression functions to represent the sensor data collected from the sensor nodes.Instead of sending the complete data to the cluster head,the sensor nodes only send the coefficients of the non-linear function.This will reduce the communication overhead of the network.The data aggregation is performed on the masked coefficients and the sink node is able to retrieve the approximated results over the aggregated data.The analysis of experiment results shows that the proposed protocol is able to minimize communication overhead,enhance data aggregation accuracy,and preserve data privacy. 展开更多
关键词 Sensor nodes data accuracy Wireless sensor networks data aggregation Privacy preserving
下载PDF
An Efficient and Secure Aggregation Encryption Scheme in Edge Computing
18
作者 Junhua Wu Xiaofei Sheng +2 位作者 Guangshun Li Kan Yu Junke Liu 《China Communications》 SCIE CSCD 2022年第3期245-257,共13页
Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing r... Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing requirements of cloud computing,but also collect and analyze distributed data.However,it inherits many security and privacy challenges of cloud computing,such as:authentication and access control.To address these problem,we proposed a new efficient privacy-preserving aggregation scheme for edge computing.Our scheme consists of two steps.First,we divided the data of the end users with the Simulated Annealing Module Partition(SAMP)algorithm.And then,the end sensors and edge nodes performed respectively differential aggregation mechanism with the Differential Aggregation Encryption(DAE)algorithm which can make noise interference and encryption algorithm with trusted authority(TA).Experiment results show that the DAE can preserve user privacy,and has significantly less computation and communication overhead than existing approaches. 展开更多
关键词 Edge computing data aggregation ENCRYPTION Simulated annealing
下载PDF
A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter
19
作者 Shan Chun Xiaolong Chen +1 位作者 Guoqiang Deng Hao Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第3期1203-1216,共14页
The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it... The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it is difficult to predict the congestion state of the link-end accurately at the source.In this paper,we presented an improved NUMFabric algorithm for calculating the overall congestion price.In the proposed scheme,the whole network structure had been obtained by the central control server in the Software Defined Network,and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.In this scheme,the first hierarchy algorithm was set up in a central control server like Opendaylight and the guiding parameter B is obtained based on the intelligent data of global link state information.Based on the historical data,the congestion state of the network and the guiding parameter B is accurately predicted by the machine learning algorithm.The second hierarchy algorithm was installed in the Openflow link and the link price was calculated based on guiding parameter B given by the first algorithm.We evaluate this evolved NUMFabric algorithm in NS3,which demonstrated that the proposed NUMFabric algorithm could efficiently increase the link bandwidth utilization of cloud computing IoT datacenters. 展开更多
关键词 Internet of Things cloud computing intelligent data aggregation distributed optimization trusted network calculation
下载PDF
Shoot Biomass Assessments of the Marine Phanerogam Zostera marina for Two Methods of Data Gathering
20
作者 Elena Solana-Arellano Héctor Echavarría-Heras +1 位作者 Victoria Díaz-Castaneda Olga Flores-Uzeta 《American Journal of Plant Sciences》 2012年第11期1541-1545,共5页
In order to compare to data gathering methods for shoot biomass assessments of Zostera marina, we compare two allometric models each one representing a data gathering method, one at leaf level and the other in aggrega... In order to compare to data gathering methods for shoot biomass assessments of Zostera marina, we compare two allometric models each one representing a data gathering method, one at leaf level and the other in aggregated form. The first allometric model presented leaf dry weight in terms of leaf length as . The second model is expressed as a several-variables version of the allometric Equation (1) dry weight of each leaf in a given shoot can be considered to be a random variable therefore shoot biomass ws can be represented in the form Both models presented similar determination coefficients values of 0.85 and 0.87 respectively. We found no significant differences between parameters α (p = 0.11) and β (p = 0.50) fitted for each model, showing that both equations conduced to the same result. Moreover, both fitted models presented high Concordance Correlation Coefficients of reproducibility () (0.92 and 0.91). We concluded that for shoot weight assessments if larger samples and faster data processing is required then should model of Equation (2) be used. On the other hand, we proposed model of Equation (1) if data at leaf level is required for other endeavors. 展开更多
关键词 Allometric Models Aggregated data Leaf Dry Weight Shoot Dry Weight
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部