[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Public Access

Privacy-Preserving Multimedia Big Data Aggregation in Large-Scale Wireless Sensor Networks

Published: 15 September 2016 Publication History

Abstract

To preserve the privacy of multimedia big data and achieve the efficient data aggregation in wireless multimedia sensor networks (WMSNs), a distributed compressed sensing--based privacy-preserving data aggregation (DCSPDA) approach is proposed in this article. First, in this approach, the original multimedia sensor data are compressed and measured by distributed compressed sensing (DCS) and the compressed data measurements are uploaded to the sink, by which the inherent characteristics between sensor data can be obtained. Second, the original multimedia data are jointly recovered and the common and innovation sparse components are obtained through solving the optimization problem and linear equations at the sink. Third, through least squares support vector machine (LSSVM) learning of the sparse components, the sparse position configuration can be determined and disseminated for each node to conduct the privacy-preserving data configuration. After receiving the configuration message, original multimedia sensor data are accordingly customized, compressed, and measured by the common measurement matrix, aggregated at the cluster heads, and transmitted to the sink. Finally, the aggregated multimedia sensor data are recovered by the sink according to the data configuration to achieve the privacy-preserving data aggregation and transmission. Our comparative simulation results validate the efficiency and scalability of DCSPDA and demonstrate that the proposed approach can effectively reduce the communication overheads and provide reliable privacy-preserving with low computational complexity for WMSNs.

References

[1]
Ian Akyildiz, Tommaso Melodia, and Kaushik Chowdury. 2007. Wireless multimedia sensor networks: A survey. IEEE Wireless Communications 14, 6, 32--39.
[2]
Ian Akyildiz, Tommaso Melodia, and Kaushik Chowdury. 2008. Wireless multimedia sensor networks: Applications and testbeds. Proceedings of the IEEE 96, 10, 1588--1605.
[3]
Carlo Caione, Davide Brunelli, and Luca Benini. 2011. Distributed compressive sampling for lifetime optimization in dense wireless sensor networks. IEEE Transactions on Industrial Informatics 8, 1, 30--40.
[4]
Marco Camilli and Richard Kleihorst. 2011. Demo: Mouse sensor networks, the smart camera. In Proceedings of the 5th ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC’11). 1--3.
[5]
Beijing Chen, Huazhong Shu, and Gouenou Coatrieux. 2014. Color image analysis by quaternion-type moments. Journal of Mathematical Imaging and Vision 51, 1, 124--144.
[6]
Cheng Chen and Tian Bin. 2010. Data aggregation technologies of wireless multimedia sensor networks: A survey. In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES’10). 83--88.
[7]
Marco F. Duarte and Shriram Sarvotham. 2005. Distributed compressed sensing of jointly sparse signals. In Proceedings of the 39th Asilomar Conference on Signals, Systems, and Computers. 1537--1541.
[8]
Mohammad Eslami and Farah Torkamani-Azar. 2014. Two frameworks for joint compressing and recovering destructed signals in wireless multimedia sensor networks. In Proceedings of the 22nd Iranian Conference on Electrical Engineering (ICEE’14). 1575--1570.
[9]
Elena Fasolo, Michele Rossi, and Jorg Widmer. 2007. In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless Communications 14, 2, 70--87.
[10]
Luigi A. Grieco and Gennaro Boggia. 2009. Secure wireless multimedia sensor networks: A survey. In Proceedings of the 3rd International Conference on Mobile Ubiquitous Computing, Systems, Services, and Technologies. 194--201.
[11]
Michael M. Groat and Wenbo He. 2011. KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE International Conference on Computer Communications. 2024--2032.
[12]
Wenbo He and Xue Liu. 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Computer Communications. 2045--2053.
[13]
Riazul Islam, Daehan Kwak, and Humaun Kabir. 2015. The Internet of Things for health care: A comprehensive survey. IEEE Access 3, 678--708.
[14]
Bhaskar Krishnamachari, Deborah Estrin, and Stephen Wicker. 2002. The impact of data aggregation in wireless sensor networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops. 575--578.
[15]
Deepa Kundur, William Luh, and Takis Zourntos. 2007. Security and privacy for distributed multimedia sensor networks. Proceedings of the IEEE 96, 1, 112--130.
[16]
Jian Li, Xiaolong Li, and Bin Yang. 2015. Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10, 3, 507--518. 2014.2381872
[17]
Yun Li, Zhenghua Zhang, and Chonggang Wang. 2013. Cooperative communications for multihop ad hoc wireless networks. IEEE Transactions on Vehicular Technology 62, 7, 3110--3122.
[18]
Changqing Luo, Shengyong Guo, and Song Guo. 2014. Green communication in energy renewable wireless mesh networks: Routing, rate control, and power allocation. IEEE Transactions on Parallel and Distributed Systems 25, 12, 3211--3220.
[19]
Suat Ozdemir and Yang Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53, 12, 2022--2037.
[20]
Zhaoqing Pan, Yun Zhang, and Sam Kwong. 2015. Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Transactions on Broadcasting 61, 2, 166--176.
[21]
Adrian Perrig, John Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Communications of the ACM 47, 6, 53--57.
[22]
Scott Pudlewski, Arvind Prasanna, and Tommaso Melodia. 2012. Compressed-sensing-enabled video streaming for wireless multimedia sensor networks. IEEE Transactions on Mobile Computing 14, 6, 1060--1072.
[23]
Fudong Qiu, Fan Wu, and Guihai Chen. 2014. Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Transactions on Mobile Computing 14, 6, 112--130.
[24]
Ramesh Rajagopalan and Pramod K. Varshney. 2006. Data-aggregation techniques in sensor networks: A survey. IEEE Communications Surveys and Tutorials 8, 4, 48--63.
[25]
John P. Walters, Zhengqiang Liang. and Weisong Shi. 2007. Wireless sensor network security: A survey. In Security in Distributed, Grid, Mobile, and Pervasive Computing, X. Xiao (Ed.). CRC Press, Boca Raton, FL, 367--410.
[26]
Thomas Winkler and Bernhard Rinner. 2013. Sensor-level security and privacy protection by embedding video content analysis. In Proceedings of the 18th International Conference on Digital Signal Processing (DSP’13). 1--6.
[27]
Dapeng Wu, Jing He, and Honggang Wang. 2015. A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks. IEEE Communications Magazine 53, 8, 92--98.
[28]
Dapeng Wu, Hongpei Zhang, and Honggang Wang. 2015. Quality-of-protection-driven data forwarding for intermittently connected wireless networks. IEEE Wireless Communications 22, 4, 66--73.
[29]
Zhihua Xia, Xinhui Wang, and Xingming Sun. 2014a. Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7, 8, 1283--1291.
[30]
Zhihua Xia, Xinhui Wang, and Xingming Sun. 2014b. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75, 4, 1947--1962.
[31]
Liu Xiang and Jun Luo. 2011. Compressed data aggregation for energy efficient wireless sensor networks. In Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON’11). 46--54.
[32]
Shengdong Xie and Yuxiang Wang. 2014. Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications 78, 1, 231--246.
[33]
Sun Yan, Luo Hong, and Das Sajal. 2012. A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing 9, 6, 785--797.
[34]
Zongxin Yu, Rui Wang, and Haiyan Zhang. 2014 Distributed compressed sensing for image signals. In Proceedings of the IEEE International Conference on Multimedia and Expo Workshops (ICMEW’14). 1--5.

Cited By

View all
  • (2024)Deep Network for Image Compressed Sensing Coding Using Local Structural SamplingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364944120:7(1-22)Online publication date: 26-Feb-2024
  • (2024)Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization ReconstructionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363530820:4(1-22)Online publication date: 11-Jan-2024
  • (2024)SSRAID: A Stripe-Queued and Stripe-Threaded Merging I/O Strategy to Improve Write Performance of Serial Interface SSD RAIDIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.344308335:10(1841-1853)Online publication date: 14-Aug-2024
  • Show More Cited By

Index Terms

  1. Privacy-Preserving Multimedia Big Data Aggregation in Large-Scale Wireless Sensor Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 12, Issue 4s
    Special Section on Trust Management for Multimedia Big Data and Special Section on Best Papers of ACM Multimedia 2015
    November 2016
    242 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/2997658
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 September 2016
    Accepted: 01 April 2016
    Revised: 01 April 2016
    Received: 01 October 2015
    Published in TOMM Volume 12, Issue 4s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Wireless multimedia sensor networks
    2. data aggregation
    3. distributed compressed sensing
    4. privacy-preserving method

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)70
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Deep Network for Image Compressed Sensing Coding Using Local Structural SamplingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364944120:7(1-22)Online publication date: 26-Feb-2024
    • (2024)Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization ReconstructionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363530820:4(1-22)Online publication date: 11-Jan-2024
    • (2024)SSRAID: A Stripe-Queued and Stripe-Threaded Merging I/O Strategy to Improve Write Performance of Serial Interface SSD RAIDIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.344308335:10(1841-1853)Online publication date: 14-Aug-2024
    • (2023)Optimizing Relay Sensors in Large-Scale Wireless Sensor Networks: A Biologically Inspired ApproachInternational Journal of Engineering Research in Africa10.4028/p-b75r0563(119-135)Online publication date: 30-Mar-2023
    • (2023)IoVT-based efficient solution for optimal active smart camera selection in a tracking missionInternet of Things10.1016/j.iot.2023.10094124(100941)Online publication date: Dec-2023
    • (2022)Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive SensingInternational Journal of Digital Crime and Forensics10.4018/IJDCF.29581213:6(1-19)Online publication date: 10-Jun-2022
    • (2021)Security Guarantee for Vehicular Message Transmission Based on Dynamic Social AttributesWireless Communications & Mobile Computing10.1155/2021/83025272021Online publication date: 20-Dec-2021
    • (2021)Synthesising Privacy by Design Knowledge Toward Explainable Internet of Things Application Designing in HealthcareACM Transactions on Multimedia Computing, Communications, and Applications10.1145/343418617:2s(1-29)Online publication date: 14-Jun-2021
    • (2021)A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future VisionJournal of Network and Computer Applications10.1016/j.jnca.2021.103084188(103084)Online publication date: Aug-2021
    • (2020)Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things SecurityIEEE Transactions on Network Science and Engineering10.1109/TNSE.2018.28811527:1(356-372)Online publication date: 1-Jan-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media