Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks

Peng Li, Chao Xu, He Xu
Copyright: © 2021 |Volume: 15 |Issue: 1 |Pages: 23
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859864|DOI: 10.4018/IJISP.20210101.oa1
Cite Article Cite Article

MLA

Li, Peng, et al. "Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks." IJISP vol.15, no.1 2021: pp.190-212. http://doi.org/10.4018/IJISP.20210101.oa1

APA

Li, P., Xu, C., & Xu, H. (2021). Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks. International Journal of Information Security and Privacy (IJISP), 15(1), 190-212. http://doi.org/10.4018/IJISP.20210101.oa1

Chicago

Li, Peng, Chao Xu, and He Xu. "Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks," International Journal of Information Security and Privacy (IJISP) 15, no.1: 190-212. http://doi.org/10.4018/IJISP.20210101.oa1

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm guarantees privacy by combining disturbance data and ensures redundancy via carrying hidden data. It also selects the routing tree that is generated by the CTP protocol as the routing path for data transmission. Through division at the source node, the method adds hidden information and disturbance data. This algorithm uses hidden data and adds perturbation data to improve the privacy preserving. Nonetheless, it can restore the original data when data are partly lost. According to the simulation via TOSSIM (TinyOS simulator), in the case of partial packet loss, the algorithm can completely restore the original data. Furthermore, the authors compared accuracy of proposed algorithm, probability of data reduction, data fitting degree, communication overhead, and PLR. As a result, it improves the reliability and privacy of data transmission while ensuring data redundancy.