A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks

被引:11
作者
Lakshmi, V. S. [1 ]
Deepthi, P. P. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Elect & Commun Engn, Calicut, Kerala, India
关键词
data aggregation; data confidentiality; homomorphic encryption; Rao-Nam encryption; wireless sensor network; FULLY HOMOMORPHIC ENCRYPTION; LDPC CODES; KEY;
D O I
10.1002/dac.3832
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data aggregation is an efficient method to reduce the energy consumption in wireless sensor networks (WSNs). However, data aggregation schemes pose challenges in ensuring data privacy in WSN because traditional encryption schemes cannot support data aggregation. Homomorphic encryption schemes are promising techniques to provide end to end data privacy in WSN. Data reliability is another main issue in WSN due to the errors introduced by communication channels. In this paper, a symmetric additive homomorphic encryption scheme based on Rao-Nam scheme is proposed to provide data confidentiality during aggregation in WSN. This scheme also possess the capability to correct errors present in the aggregated data. The required security levels can be achieved in the proposed scheme through channel decoding problem by embedding security in encoding matrix and error vector. The error vectors are carefully designed so that the randomness properties are preserved while homomorphically combining the data from different sensor nodes. Extensive cryptanalysis shows that the proposed scheme is secure against all attacks reported against private-key encryption schemes based on error correcting codes. The performance of the encryption scheme is compared with the related schemes, and the results show that the proposed encryption scheme outperforms the existing schemes.
引用
收藏
页数:21
相关论文
共 43 条
[1]   Efficient secure channel coding based on quasi-cyclic low-density parity-check codes [J].
Afshar, A. A. Sobhi ;
Eghlidos, T. ;
Aref, M. R. .
IET COMMUNICATIONS, 2009, 3 (02) :279-292
[2]  
[Anonymous], 2008, ELLIPTIC CURVES NUMB, DOI DOI 10.1201/9781420071474
[3]  
[Anonymous], ADV CRYPT CRYPTO 87
[4]  
[Anonymous], 1978, FDN SEC COMPUT
[5]   Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes [J].
Baldi, Marco ;
Chiaraluce, Franco .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :2591-2595
[6]  
Barnault L, 2003, 2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, P70
[7]   Secure and efficient verification for data aggregation in wireless sensor networks [J].
Boudia, Omar Rafik Merad ;
Senouci, Sidi Mohammed ;
Feham, Mohammed .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
[8]   EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
SIAM JOURNAL ON COMPUTING, 2014, 43 (02) :831-871
[9]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[10]   RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks [J].
Chen, Chien-Ming ;
Lin, Yue-Hsun ;
Lin, Ya-Ching ;
Sun, Hung-Min .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) :727-734