An efficient and verifiable concealed data aggregation scheme in wireless sensor networks

被引:17
|
作者
Sun, Hung-Min [1 ]
Lin, Yue-Hsun [1 ]
Hsiao, Ying-Chu [1 ]
Chen, Chien-Ming [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2008年
关键词
D O I
10.1109/ICESS.2008.9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation is one of the most important techniques in wireless sensor networks to save energy through reducing lots of transmission. However, plaintext aggregation is insecure since eavesdropping or modifying messages is possible. Due to this, concealed data aggregation schemes based. on homomorphic encryption have been proposed. Ciphertexts can be operated algebraic computations without decryption in those schemes. Unfortunately, they only provide data confidentiality. While compromising secret in captured sensor nodes, an adversary can still create forged ciphertexts. In this paper, we combines Boneh et al.'s aggregate signature scheme and Mykletun et al.'s concealed data aggregation scheme to overcome the above problems. The proposed scheme aggregates not only ciphertexts but also signatures. Through verifying aggregated signature, data integrity of each plaintext can be guaranteed. Furthermore, the communication overhead for each cluster head is still constant. Each cluster head sends an aggregated signature and an aggregated ciphertext to the base station. For resource constrained environment, the proposed scheme is secure and efficient practically.
引用
收藏
页码:19 / 26
页数:8
相关论文
共 50 条
  • [1] Efficient concealed data aggregation with verification in wireless sensor networks
    Rafik, Merad Boudia Omar
    Mohammed, Feham
    2014 INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING DISTRIBUTED SYSTEMS AND APPLICATIONS (INDS 2014), 2014, : 76 - 81
  • [2] An Efficient Data Aggregation Scheme in Wireless Sensor Networks
    Wang, Ying
    Li, Guorui
    INTERNET OF THINGS-BK, 2012, 312 : 25 - +
  • [3] Energy Efficient Recoverable Concealed Data Aggregation in Wireless Sensor Networks
    Jose, Josna
    Kumar, Manoj S.
    Jose, Joyce
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 322 - 329
  • [4] CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks
    Lin, Yue-Hsun
    Chang, Shih-Ying
    Sun, Hung-Min
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (07) : 1471 - 1483
  • [5] An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks
    Yang, L. J.
    Ding, C.
    Wu, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 136 - 138
  • [6] AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARING
    Horng, Gwoboa
    Wang, Chien-Lung
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (10A): : 3085 - 3097
  • [7] An efficient concealed data aggregation scheme for sensor networks based on secret sharing
    Horng, Gwoboa
    Wang, Chien-Lung
    Chen, Tzung-Her
    International Journal of Innovative Computing, Information and Control, 2009, 5 (10): : 3085 - 3097
  • [8] Efficient encrypted data aggregation scheme for wireless sensor networks
    Guo, J. (gjhjyu@gmail.com), 2013, Science Press (40):
  • [9] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [10] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52