SDAMQ: Secure Data Aggregation for Multiple Queries in Wireless Sensor Networks

被引:9
作者
Prathima, E. G. [1 ]
Prakash, T. Shiv [2 ]
Venugopal, K. R. [1 ]
Iyengar, S. S. [3 ]
Patnaik, L. M. [4 ]
机构
[1] Bangalore Univ, Univ Visvesvaraya, Coll Engn, Bangalore 560001, Karnataka, India
[2] Vijaya Vittala Inst Technol, Bangalore, Karnataka, India
[3] Florida Int Univ, Miami, FL 33199 USA
[4] Indian Inst Sci Campus, Natl Inst Adv Studies, INSA, Bangalore, Karnataka, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Additive Homomorphism; Authentication; Concealed Data Aggregation; Multiple Queries; WSN;
D O I
10.1016/j.procs.2016.06.060
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Network consists of severely energy constrained sensor nodes and are susceptible to security attacks due to broadcast communication model. It is necessary to optimize the transmission of packets to reduce the energy consumption. In addition data has to be encrypted in order to overcome the attack from the compromising nodes. We propose Secure Data Aggregation for Multiple Queries (SDAMQ) in Wireless Sensor Networks where multiple aggregate queries from the sink are authenticated and distributed to the sensor nodes. The sensor nodes respond by aggregating data belonging to multiple coexisting queries into a single packet, there by reducing the transmission cost. The intermediary nodes aggregate the encrypted data using additively homomorphic encryption. Thus authenticated query propagation combined with homomorphic encryption provide secure data aggregation at low energy consumption. Simulation results shows that SDAMQ provides better performance. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:283 / 292
页数:10
相关论文
共 50 条
  • [31] Energy Efficient Clustering Scheme with secure data aggregation for mobile wireless sensor networks 9EECSSDA)
    Mohan, B. A.
    Dayananda, K. R.
    Devi, Saroja H.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [32] Efficient Multilevel Data Aggregation Technique for Wireless Sensor Networks
    Abhijith, H., V
    Dakshayini, M.
    2013 INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS AND COMMUNICATIONS (CCUBE), 2013,
  • [33] Intrusion Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Radhakrishnan, Maivizhi
    Palanichamy, Yogesh
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 227 - 234
  • [34] Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Parmar, Keyur
    Jinwala, Devesh C.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) : 971 - 993
  • [35] Data Aggregation in Wireless Sensor Networks: From the Perspective of Security
    Liu, Xiaowu
    Yu, Jiguo
    Li, Feng
    Lv, Weifeng
    Wang, Yinglong
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 6495 - 6513
  • [36] Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Keyur Parmar
    Devesh C. Jinwala
    Wireless Personal Communications, 2016, 87 : 971 - 993
  • [37] SAPWSN: A Secure Authentication Protocol for Wireless Sensor Networks
    Darbandeh, Foroozan Ghosairi
    Safkhani, Masoumeh
    COMPUTER NETWORKS, 2023, 220
  • [38] Secure and Lightweight Hierarchical Cluster-Based Data Routing for Wireless Sensor Networks
    Hamouid, Khaled
    Barkat, Amine
    Othmen, Salwa
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 11 - 16
  • [39] Energy Efficient Aggregation in Wireless Sensor Networks for Multiple Base Stations
    Busireddy, Nagarjuna Reddy
    Udgata, Siba K.
    SWARM, EVOLUTIONARY, AND MEMETIC COMPUTING, PT II (SEMCCO 2013), 2013, 8298 : 453 - 464
  • [40] Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks
    Das, Manik Lal
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 240 - 245