A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks

被引:56
作者
Shim, Kyung-Ah [1 ]
Park, Cheol-Min [1 ]
机构
[1] Natl Inst Math Sci, Div Math Modeling, Taejon, South Korea
关键词
Batch verification; end-to-end confidentiality; homomorphic encryption; authentication; identity-based signature; wireless sensor network; secure data aggregation; BATCH VERIFICATION; DIGITAL-SIGNATURES; IDENTIFICATION; EFFICIENT; PROTOCOLS;
D O I
10.1109/TPDS.2014.2346764
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Energy cost of transmitting a single bit of information is approximately the same as that needed for processing a thousand operations in a typical sensor node. Thus, a practical way to prolong a wireless sensor network lifetime is to reduce the sensor energy consumption in data transmissions. Data aggregation is an efficient way to minimize energy consumption on sensors. In this paper, we propose a practical secure data aggregation scheme, Sen-SDA, based on an additive homomorphic encryption scheme, an identity-based signature scheme, and a batch verification technique with an algorithm for filtering injected false data. We then investigate the feasibility of our scheme using low-cost microcontrollers choosing two popular IEEE 802.15.4-compliant wireless sensor network hardware platforms, MICAz and Tmote Sky, used in real-life deployments.
引用
收藏
页码:2128 / 2139
页数:12
相关论文
共 40 条
[1]  
[Anonymous], 1999, National Institute of Standards and Technology
[2]  
[Anonymous], AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]  
[Anonymous], 2000, STANDARDS EFFICIENT
[4]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P236, DOI 10.1007/BFb0054130
[5]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
[6]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Boneh D., 2001, Lecture Notes in Computer Science, P514
[9]  
Castelluccia C., 2005, P MOBIQUITOUS, P1
[10]   Battery power-aware encryption [J].
Stevens Institute of Technology ;
不详 ;
不详 ;
不详 .
ACM Trans. Inf. Syst. Secur., 2006, 2 (162-180)