IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
View Sample PDF
Author(s): Peng Li (Nanjing University of Posts and Telecommunications, China), Chao Xu (Nanjing University of Posts and Telecommunications, China)and He Xu (Nanjing University of Posts and Telecommunications, China)
Copyright: 2021
Volume: 15
Issue: 1
Pages: 23
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco)and Ahmed A. Abd El-Latif (Menoufia University, Egypt)
DOI: 10.4018/IJISP.20210101.oa1

Purchase

View Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks on the publisher's website for pricing and purchasing information.

Abstract

In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.

Related Content

Dongyan Zhang, Lili Zhang, Zhiyong Zhang, Zhongya Zhang. © 2024. 19 pages.
Zhiqiang Wu. © 2024. 15 pages.
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi. © 2024. 27 pages.
. © 2024.
. © 2024.
Zhen Gu, Guoyin Zhang. © 2023. 15 pages.
Mallanagouda Biradar, Basavaraj Mathapathi. © 2023. 18 pages.
Body Bottom