Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

被引:103
作者
Ozdemir, Suat [1 ]
Xiao, Yang [2 ]
机构
[1] Gazi Univ, Dept Comp Engn, TR-06570 Ankara, Turkey
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
基金
美国国家科学基金会;
关键词
Data integrity; Data confidentiality; Concealed data aggregation; Wireless sensor networks;
D O I
10.1016/j.comnet.2011.01.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, performing data aggregation while preserving data confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure data aggregation schemes have been proposed to seamlessly integrate confidentiality and data aggregation. However, these schemes do not provide data integrity or allow hierarchical data aggregation if more than one encryption key is used in the network. This paper presents a novel integrity protecting hierarchical concealed data aggregation protocol that allows the aggregation of data packets that are encrypted with different encryption keys. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. The proposed data aggregation scheme employs an elliptic curve cryptography-based homomorphic encryption algorithm to offer data integrity and confidentiality along with hierarchical data aggregation. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1735 / 1746
页数:12
相关论文
共 28 条
[1]   The impact of data aggregation sensor networks on the performance of wireless [J].
Akkaya, Kemal ;
Demirbas, Murat ;
Aygun, R. Savas .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (02) :171-193
[2]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[3]  
[Anonymous], 1997, HDB APPL CRYPTOGRAPH
[4]  
[Anonymous], 2010, TINYOS SIM
[5]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[6]  
Boneh D., 2005, LNCS, V3374, P325
[7]   Energy-efficient secure pattern based data aggregation for wireless sensor networks [J].
Çam, H ;
Özdemir, S ;
Nair, P ;
Muthuavinashiappan, D ;
Sanli, HO .
COMPUTER COMMUNICATIONS, 2006, 29 (04) :446-455
[8]   Query Privacy in Wireless Sensor Networks [J].
Carbunar, Bogdan ;
Yu, Yang ;
Shi, Weidong ;
Pearce, Michael ;
Vasudevan, Venu .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2010, 6 (02)
[9]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[10]   Privacy-preserving robust data aggregation in wireless sensor networks [J].
Conti, Mauro ;
Zhang, Lei ;
Roy, Sankardas ;
Di Pietro, Roberto ;
Jajodia, Sushil ;
Mancini, Luigi Vincenzo .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) :195-213