Hybrid Secure Data Aggregation in Wireless Sensor Networks

被引:3
作者
Parmar, Keyur [1 ]
Jinwala, Devesh C. [1 ]
机构
[1] SV Natl Inst Technol, Surat, India
来源
CYBER PHYSICAL SYSTEMS: DESIGN, MODELING, AND EVALUATION, CYPHY 2015 | 2015年 / 9361卷
关键词
Wireless sensor networks; Security; Secure data aggregation; Privacy homomorphism; Communication overhead; CONCEALED DATA AGGREGATION; PRIVACY;
D O I
10.1007/978-3-319-25141-7_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data aggregation aims at combining security and data aggregation together to meet the requirements of data-centric networks such as wireless sensor network. Secure data aggregation protocols provide either hop-by-hop security or end-to-end security. However, hop-by-hop secure data aggregation is vulnerable to attackers at intermediate nodes while end-to-end secure data aggregation increases the communication overhead. In this paper, we propose a hybrid secure data aggregation protocol to balance the trade-off between privacy and communication overhead. The proposed protocol uses the symmetric-key based privacy homomorphism to ensure the privacy of sensor readings at intermediate nodes. In addition, the proposed protocol efficiently deals with the key management issues that exist in the state-of-the-art symmetric-key based protocols. The proposed protocol also reduces the communication overhead as compared to the existing end-to-end secure data aggregation protocols. Comprehensive analysis and comparisons validate the viability of the proposed protocol in resource-constrained wireless sensor networks.
引用
收藏
页码:116 / 131
页数:16
相关论文
共 26 条
  • [11] Hankerson D., 2003, Guide to Elliptic Curve Cryptography
  • [12] Hill J, 2000, ACM SIGPLAN NOTICES, V35, P93, DOI 10.1145/384264.379006
  • [13] Hu LX, 2003, 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, P384, DOI 10.1109/SAINTW.2003.1210191
  • [14] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [15] Levis P, 2005, AMBIENT INTELLIGENCE, P115
  • [16] A public-key infrastructure for key i)istribution in TinyOS based on elliptic curve cryptography
    Malan, DJ
    Welsh, M
    Smith, MD
    [J]. 2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 71 - 80
  • [17] Mlaih E., 2008, P IEEE INFOCOM WORKS, P1, DOI DOI 10.1109/INFOCOM.2008.4544601
  • [18] Mykletun E, 2006, IEEE ICC, P2288
  • [19] Secure data aggregation in wireless sensor networks: A comprehensive overview
    Ozdemir, Suat
    Xiao, Yang
    [J]. COMPUTER NETWORKS, 2009, 53 (12) : 2022 - 2037
  • [20] Parmar K., 2015, J. Inf. Secur, V6, P38