Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks

被引:46
作者
Cui, Jie [1 ]
Shao, Lili [1 ]
Zhong, Hong [1 ]
Xu, Yan [1 ]
Liu, Lu [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Univ Derby, Dept Elect Comp & Math, Derby DE22 1GB, England
基金
中国国家自然科学基金;
关键词
Data aggregation; Confidentiality; Integrity; Homomorphic encryption; Large-scale wireless sensor networks; CONCEALED DATA AGGREGATION; SCHEME;
D O I
10.1007/s12083-017-0581-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.
引用
收藏
页码:1022 / 1037
页数:16
相关论文
共 30 条
  • [1] Homomorphic MACs: MAC-Based Integrity for Network Coding
    Agrawal, Shweta
    Boneh, Dan
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 292 - +
  • [2] [Anonymous], ULTRA LOW POWER IEEE
  • [3] [Anonymous], 2010, P THE7 INT C WIR OPT
  • [4] [Anonymous], Proceedings of the 2Nd International Conference on Embedded Networked Sensor Systems. SenSys'04, DOI DOI 10.1145/1031495.1031515
  • [5] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Ben Othman, Soufiene
    Bahattab, Abdullah Ali
    Trad, Abdelbasset
    Youssef, Habib
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 867 - 889
  • [6] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [7] A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    [J]. AD HOC NETWORKS, 2015, 32 : 98 - 113
  • [8] Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
  • [9] RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
    Chen, Chien-Ming
    Lin, Yue-Hsun
    Lin, Ya-Ching
    Sun, Hung-Min
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) : 727 - 734
  • [10] Crossbow Technology Inc., 2007, IMOTE2 HARDW REF MAN