{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:04Z","timestamp":1740141784702,"version":"3.37.3"},"reference-count":18,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003708","name":"Korea Institute of Science & Technology Information","doi-asserted-by":"crossref","award":["K-13-L02-C02-S02","2010-0023800"],"award-info":[{"award-number":["K-13-L02-C02-S02","2010-0023800"]}],"id":[{"id":"10.13039\/501100003708","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["K-13-L02-C02-S02","2010-0023800"],"award-info":[{"award-number":["K-13-L02-C02-S02","2010-0023800"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,6,1]]},"abstract":"<jats:p> Data aggregation techniques have been proposed for wireless sensor networks (WSNs) to address the problems presented by the limited resources of sensor nodes. The provision of efficient data aggregation to preserve data privacy is a challenging issue in WSNs. Some existing data aggregation methods for preserving data privacy are CPDA, SMART, the Twin-Key based method, and GP2S. These methods, however, have two limitations. First, the communication cost for network construction is considerably high. Second, they do not support data integrity. There are two methods for supporting data integrity, iCPDA and iPDA. But they have high communication cost due to additional integrity checking messages. To resolve this problem, we propose a novel Hilbert-curve based data aggregation scheme that enforces data privacy and data integrity for WSNs. To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. To support data integrity, we use an integrity checking algorithm based on the PIR technique by directly communicating between parent and child nodes. Finally, through a performance analysis, we show that our scheme outperforms the existing methods in terms of both energy efficiency and privacy preservation. <\/jats:p>","DOI":"10.1155\/2013\/217876","type":"journal-article","created":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T21:01:25Z","timestamp":1371070885000},"page":"217876","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Yong-Ki","family":"Kim","sequence":"first","affiliation":[{"name":"Korea Institute of Science and Technology Information, Daejeon 305-806, Republic of Korea"}]},{"given":"Hyunjo","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Chonbuk National University, Chonju, Chonbuk 561-756, Republic of Korea"}]},{"given":"Min","family":"Yoon","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Chonbuk National University, Chonju, Chonbuk 561-756, Republic of Korea"}]},{"given":"Jae-Woo","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Chonbuk National University, Chonju, Chonbuk 561-756, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,6,12]]},"reference":[{"volume-title":"Proceedings of the International Parallel and Distributed Processing Symposium","author":"Du K.","key":"B4-2013-217876"},{"key":"B5-2013-217876","unstructured":"Heinzelman W. R.Application-specific protocol architectures for wireless networks [Ph.D. thesis]2000Massachusetts Institute of Technology"},{"key":"B6-2013-217876","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"B7-2013-217876","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1036066"},{"key":"B8-2013-217876","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844142"},{"key":"B9-2013-217876","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"B10-2013-217876","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"B11-2013-217876","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"B12-2013-217876","doi-asserted-by":"publisher","DOI":"10.1002\/sec.95"},{"first-page":"341","volume-title":"Proceedings of the 3rd IEEE International Conferenceon Security and Privacy in Communication Networks (SecureComm '07)","author":"Choi H.","key":"B13-2013-217876"},{"key":"B14-2013-217876","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.60"},{"first-page":"14","volume-title":"Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS '09)","author":"He W.","key":"B15-2013-217876"},{"first-page":"261","volume-title":"Proceedings of the 34rd Annual IEEE Symposium on Foundations of Computer Science","author":"Beimel A.","key":"B16-2013-217876"},{"key":"B17-2013-217876","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"first-page":"364","volume-title":"Proceedings of the 38th Annual Symposium on Foundations of Computer Science","author":"Kushilevitz E.","key":"B18-2013-217876"},{"key":"B20-2013-217876","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223258"},{"volume-title":"Proceedings of the International Joint Conference on Computer Science and Software Engineering (JCSSE '07)","author":"Panthachai Y.","key":"B21-2013-217876"},{"key":"B22-2013-217876","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/217876","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/217876","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/217876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:02:27Z","timestamp":1621191747000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/217876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,1]]},"references-count":18,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6,1]]}},"alternative-id":["10.1155\/2013\/217876"],"URL":"https:\/\/doi.org\/10.1155\/2013\/217876","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,6,1]]}}}