This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation
October 2006 (vol. 5 no. 10)
pp. 1417-1431
Routing in wireless sensor networks is different from that in commonsense mobile ad-hoc networks. It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem. To save the overall energy resources of the network, sensed data needs to be consolidated and aggregated on its way to the final destination. We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating intermediate nodes are not required to operate on the sensed plaintext data. We apply a particular class of encryption transformations and discuss techniques for computing the aggregation functions "average” and "movement detection.” We show that the approach is feasible for the class of "going down” routing protocols. We consider the risk of corrupted sensor nodes by proposing a key predistribution algorithm that limits an attacker's gain and show how key predistribution and a key-ID sensitive "going down” routing protocol help increase the robustness and reliability of the connected backbone.

[1] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order Preserving Encryption for Numeric Data,” Proc. ACM SIGMOD Conf., June 2004.
[2] M. Acharya, J. Girao, and D. Westhoff, “Secure Comparison of Encrypted Data in Wireless Sensor Networks,” Proc. Third Int'l Symp. Modeling and Optimization in Mobile, Ad-Hoc, and Wireless Networks (WiOpt 2005), Apr. 2005.
[3] R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham, “A New Family of Authentication Protocols,” ACM Operating Systems Rev., vol. 32, 1998.
[4] J. Benaloh, “Dense Probabilistic Encryption,” Proc. Workshop Selected Areas of Cryptography, pp. 120-128, 1994.
[5] M. Bohge and W. Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks,” Proc. Second ACM Workshop Wireless Security (WiSe '03), pp. 79-87, Sept. 2003.
[6] A. Boulis, S. Ganeriwal, and M.B. Srivastava, “Aggregation in Sensor Networks: An Energy-Accuracy Trade-Off,” Elsevier J. Ad Hoc Networks, vol. 1, nos. 2-3, pp. 317-331, Sept. 2003.
[7] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), July 2005.
[8] Crossbow Products, http://www.xbow.com/ProductsWireless SensorNetworks.htm , Oct. 2004.
[9] A. Cerpa and D. Estrin, “ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies,” IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 272-285, July-Sept. 2004.
[10] X. Cheng, B. Narahari, R. Simha, M.X. Cheng, and D. Liu, “Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics,” IEEE Trans. Mobile Computing, vol. 2, no. 3, pp. 248-256, July-Sept. 2003.
[11] J. Deng, R. Han, and S. Mishra, “Security Support for In-Network Processing in Wireless Sensor Networks,” Proc. First ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '03), pp. 83-93, Oct. 2003.
[12] D. Dolev and A.C. Yao, “On the Security of Public-Key Protocols,” IEEE Trans. Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
[13] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. 23rd Ann. Joint Conf. IEEE Computer and Comm. Societies (INFOCOM '04), 2004.
[14] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, Oct. 2003.
[15] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes,” Proc. ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA '03), Sept. 2003.
[16] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS '02), Nov. 2002.
[17] J. Girao, D. Westhoff, and M. Schneider, “CDA: Concealed Data Aggregation in Wireless Sensor Networks,” Proc. ACM Workshop on Wireless Security (WiSe '04), Oct. 2004.
[18] J. Girao, D. Westhoff, and M. Schneider, “CDA: Concealed Data Aggregation in Wireless Sensor Networks,” Proc. IEEE Int'l Conf. Comm. (ICC '05), May 2005.
[19] W.B. Heinzelmann, A.P. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Archtitecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
[20] M. Horton, D. Culler, K. Pister, J. Hill, R. Szewczyk, and A. Woo, “MICA, The Commercialization of Microsensor Motes,” Sensors, vol. 19, no. 4, pp. 40-48, Apr. 2002.
[21] P. Levis, N. Lee, M. Welsh, and D. Cullar, “TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications,” Proc. First ACM Conf. Embedded Networked Aensor Systems (SenSys) 2003, Nov. 2003.
[22] R. Lipton and T. Sander, “An Additively Homomorphic Encryption Scheme or How to Introduce a Partial Trapdoor in the Discrete Log,” Nov. 1997.
[23] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, Oct. 2003.
[24] Y. Ma and J.H Aylor, “System Lifetime Optimization for Heterogeneous Sensor Network with Hub-Spoke Topology,” IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 286-294, July-Sept. 2004.
[25] A.J. Menezes, P.C. van Oorshot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
[26] D. Naccache and J. Stern, “A New Public-Key Cryptosystem,” Proc. Conf. Advances in Cryptology (EUROCRYPT '97), pp. 27-36, May 1997.
[27] T. Okamoto and S. Uchiyama, “A New Public-Key Cryptosystem as Secure as Factoring,” Proc. Conf. Advances in Cryptology (EUROCRYPT '98), pp. 208-318, May 1998.
[28] S. Park and M. Srivastava, “Power Aware Routing in Sensor Networks Using Dynamic Source Routing,” ACM Mobile Networks and Applications, special issue on energy conserving protocols in wireless networks, 1999.
[29] A. Perrig, R. Canneti, D. Song, and J.D. Tygar, “The TESLA Broadcast Authentication Protocol,” RSA Cryptobytes, Summer 2002.
[30] A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, and J.D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Mobile Computing and Networking, pp. 189-199, 2001.
[31] R. Di Pietro, L.V. Mancini, and A. Mei, “Random Key-Assignment for Secure Wireless Sensor Networks,” Proc. First ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '03), pp. 62-71, Oct. 2003.
[32] RFM Mo nolithics, “Tr1000 Low Power Radio System,” http://www.rfm.com/products/datatr1000.pdf , 2003.
[33] R.L. Rivest, L. Adleman, and M.L. Dertouzos, “On Data Banks and Privacy Homomorphisms,” Foundations of Secure Computation, pp. 169-179, 1978.
[34] J. Domingo-Ferrer, “A Provably Secure Additive and Multiplicative Privacy Homomorphism,” Proc. Information Security Conf., pp. 471-483, Oct. 2002.
[35] B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Data Aggregation in Sensor Networks,” Proc. First ACM Workshop Sensor Systems (SenSys '03), Nov. 2003.
[36] S. Singh, M. Woo, and C. Raghavendra, “Power-Aware Routing in Mobile Ad Hoc Networks,” Proc. Fourth Ann. ACM/IEEE Int'l Conf. Mobile Computing Networking (MobiCom), Oct. 1998.
[37] C. Karlof, N. Sastry, and D. Wagner http://www.cs.berkeley. edu/nkstinysec/, 2004.
[38] D. Wagner, “Cryptanalysis of an Algebraic Privacy Homomorphism,” Proc. Sixth Information Security Conf. (ISC03), Oct. 2003.
[39] N. Sastry, and D. Wagner, “Security Considerations for IEEE 802.15.4 Networks,” Proc. Third ACM Workshop Wireless Security, pp. 32-42, Oct. 2004.
[40] Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks, IEEE Standard, 802.15.4-2003, May 2003.
[41] A. Weimerskirch and D. Westhoff, “Zero-Common Knowledge Authentication for Pervasive Networks,” Proc. 10th Workshop Selected Areas in Cryptography (SAC '03), pp. 73-87, July 2003.
[42] A. Weimerskirch and D. Westhoff, “Identity Certified Zero-Common Knowledge Authentication,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '03), Oct. 2003.
[43] A. Weimerskirch, D. Westhoff, S. Lucks, and E. Zenner, “Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis,” Sensor Network Operations, S. Phoha, T.F. La Porta, and C. Griffin, eds. Wiley-IEEE Press, May 2006.
[44] Zigbee Alliance, http:/www.zigbee.org, 2004

Index Terms:
Wireless sensor networks, data encryption, data aggregation, robustness and reliability, privacy homomorphism, key predistribution.
Citation:
Dirk Westhoff, Joao Girao, Mithun Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Transactions on Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006, doi:10.1109/TMC.2006.144
Usage of this product signifies your acceptance of the Terms of Use.