Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks

被引:12
作者
Bahi, Jacques M. [1 ]
Guyeux, Christophe [1 ]
Makhoul, Abdallah [1 ]
机构
[1] Univ Franche Comte LIFC, Comp Sci Lab, F-90016 Belfort, France
来源
2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM) | 2008年
关键词
Wireless Sensor Networks; Secure Data Agregation; Homomorphic Encryption; Elliptic Curves;
D O I
10.1109/SENSORCOMM.2010.76
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, usually the carried information contains confidential data. Therefore, an end-to-end secure aggregation approach is required to ensure a healthy data reception. End-to-end encryption schemes that support operations over cypher-text have been proved important for private party sensor network implementations. Unfortunately, nowadays these methods are very complex and not suitable for sensor nodes having limited resources. In this paper, we propose a secure end-to-end encrypted-data aggregation scheme. It is based on elliptic curve cryptography that exploits a smaller key size. Additionally, it allows the use of higher number of operations on cypher-texts and prevents the distinction between two identical texts from their cryptograms. These properties permit to our approach to achieve higher security levels than existing cryptosystems in sensor networks. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead and can be practically implemented in on-the-shelf sensor platforms. By using homomorphic encryption on elliptic curves, we thus have realized an efficient and secure data aggregation in sensor networks.
引用
收藏
页码:472 / 477
页数:6
相关论文
共 16 条
[1]   Secure comparison of encrypted data in wireless sensor networks [J].
Acharya, M ;
Girao, J ;
Westhoff, D .
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, :47-53
[2]  
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[3]  
Barker E., DRAFT NIST SPECIAL P
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]   Energy-efficient secure pattern based data aggregation for wireless sensor networks [J].
Çam, H ;
Özdemir, S ;
Nair, P ;
Muthuavinashiappan, D ;
Sanli, HO .
COMPUTER COMMUNICATIONS, 2006, 29 (04) :446-455
[6]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[7]   Battery power-aware encryption [J].
Stevens Institute of Technology ;
不详 ;
不详 ;
不详 .
ACM Trans. Inf. Syst. Secur., 2006, 2 (162-180)
[8]   Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme [J].
Cheon, JH ;
Kim, WH ;
Nam, HS .
INFORMATION PROCESSING LETTERS, 2006, 97 (03) :118-123
[9]   Customizable elliptic curve cryptosystems [J].
Cheung, RCC ;
Telle, NJB ;
Luk, W ;
Cheung, PYK .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2005, 13 (09) :1048-1059
[10]  
Domingo-Ferrer J., 2003, 6 ISC C, P471