Advertisement

An Energy Efficient and Secure Data Aggregation Method for WSNs Based on Dynamic Set

  • Jinsheng Zhu
  • Zhiping JiaEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 699)

Abstract

As the era of big data comes, numerous research works have been directed to focus on the massive, multi-source data acquisition, transmission, storage and management. The wireless sensor network is an important way and means to get “metadata” for big data. However, restricted energy resources and poor security have always been the bottleneck of wireless sensor network. In this paper, based on the method of software and hardware co-design, we introduce non-volatile memory (NVM) into memory system and propose an algorithm DAEE, managing the NVM dynamically to reduce energy cost and meanwhile adopting the security model of dynamic set theory to improve the data security. Experimental results show that the proposed method effectively guarantees the data security, reduces the network data flow and the whole network energy consumption, providing an efficient way for data processing in wireless sensor network.

Keywords

WSNs NVM Dynamic set Software-hardware co-design 

References

  1. 1.
    Manyika, J., Chui, M., Brown, B., et al.: Big data: the next frontier for innovation, competition, and productivity. Analytics (2011)Google Scholar
  2. 2.
    Lohr, S.: The age of big data. New York Times (2012)Google Scholar
  3. 3.
    Mayer-Schönberger, V., Cukier, K.: Big Data: A Revolution that Will Transform How We Live, Work, and Think. Houghton Mifflin Harcourt, Boston (2013)Google Scholar
  4. 4.
    Chen, H., Chiang, R.H.L., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165–1188 (2012)Google Scholar
  5. 5.
    Akyildiz, L.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. Commun. Mag. IEEE 40(8), 102–114 (2002)CrossRefGoogle Scholar
  6. 6.
    Lotf, J.J., Ghazani, S.H.H.N.: Overview on routing protocols in wireless sensor networks. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 3, pp. 610–614. IEEE, Piscataway (2010)Google Scholar
  7. 7.
    Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Pawlak, Z.: Roughsets. Int. J. Comput. Inf. Sci. 11, 341–356 (1982)CrossRefGoogle Scholar
  9. 9.
    Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor network. In: IEEE Proceedings of the Hawaii International Conference on System Science, Washington, pp. 3005–3014 (2000)Google Scholar
  10. 10.
    Royer, E.M., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Pers. Commun. Mag. 46–55 (1999)Google Scholar
  11. 11.
    Liu, F., Chen, Z.G., Liu, Y.P., Xiao, N.: Development and prospect of solid-state storage technology. Comput. Soc. Newslett. China 15–20 (2012)Google Scholar
  12. 12.
    Lu, Y.Y., Shu, J.: Survey on flash-based storage systems. J. Comput. Res. Dev. 49–59 (2013)Google Scholar
  13. 13.
    Wong, H.S.P., Raoux, S., Kim, S.B., et al.: Phase change memory. Proc. IEEE 2201–2227 (2010)Google Scholar
  14. 14.
    Shi, K.q.: P-sets. J. Shandong Univ. (Nat. Sci.) 77–84 (2008)Google Scholar
  15. 15.
    Shi, K.q.: Function P-sets. J. Shandong Univ. (Nat. Sci.) 62–69 (2011)Google Scholar
  16. 16.
    Fan, C.: The Study of Dynamic Information and Dynamic Information Law Characteristic. Shandong University, Shandong (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyUniversity of ShandongJinanChina

Personalised recommendations