The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January-March (2010 vol.7)
pp: 20-34
Dirk Westhoff , NEC Europe Ltd.
ABSTRACT
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages are 1) neither keys nor plaintext is available at aggregating nodes, 2) the overall energy consumption of the backbone can be reduced, 3) the system is more flexible with respect to changing routes, and finally 4) the overall system security increases. We provide a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.
INDEX TERMS
Cryptography, wireless sensor networks, convergecast, concealed data aggregation.
CITATION
Steffen Peter, Dirk Westhoff, Claude Castelluccia, "A Survey on the Encryption of Convergecast Traffic with In-Network Processing", IEEE Transactions on Dependable and Secure Computing, vol.7, no. 1, pp. 20-34, January-March 2010, doi:10.1109/TDSC.2008.23
REFERENCES
[1] M. Acharya, J. Girao, and D. Westhoff, "Secure Comparison of Encrypted Data in Wireless Sensor Networks," Proc. Third Int'l Symp. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2005.
[2] J.M. Adler, W. Dai, R.L. Green, and C.A. Neff, "Computational Details of the VoteHere Homomorphic Election System," Proc. Ann. Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), 2000.
[3] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order Preserving Encryption for Numeric Data," Proc. ACM SIGMOD, 2004.
[4] F. Armknecht, J. Girao, and D. Westhoff, "Topology Aware Key Management for Homomorphic Encryption of Convergecast Traffic in Wireless Sensor Networks," Computer Comm., special issue on algorithmic and theoretical aspects of wireless ad hoc and sensor networks, 2008.
[5] J. Benaloh, "Dense Probabilistic Encryption," Proc. Workshop Selected Areas of Cryptography (SAC '94), pp. 120-128, 1994.
[6] E.F. Brickell and Y. Yacobi, "On Privacy Homomorphisms," Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '88), vol. 304, pp. 117-125, 1988.
[7] C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous '05), July 2005.
[8] C. Castelluccia, Cryptology ePrint Archive, AIE, Report 2006/416, http:/eprint.iacr.org/, 2006.
[9] A. Cerpa and D. Estrin, "ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 272-285, July-Sept. 2004.
[10] D. Dolev and A.C. Yao, "On the Security of Public-Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
[11] J. Domingo-Ferrer, "A Provably Secure Additive and Multiplicative Privacy Homomorphism," Proc. Fifth Information Security Conf. (ISC '02), pp. 471-483, 2002.
[12] T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '85), vol. 31, no. 4, pp. 469-472, July 1985.
[13] L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. ACM Conf. Computer and Comm. Security (CCS '02), Nov. 2002.
[14] S. Galbraith, "Elliptic Curve Paillier Schemes," J. Cryptology, vol. 15, pp. 129-138, 2002.
[15] J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "TinyPEDS: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Elsevier Ad Hoc J., vol. 5, no. 7, pp. 1073-1089, Sept. 2007.
[16] J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC '05), May 2005.
[17] W.B. Heinzelmann, A.P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
[18] J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed Data Aggregation in Wireless Sensor Networks," Proc. ACM Workshop Wireless Security (WiSe '04), in conjunction with ACM MobiCom '04, Oct. 2004.
[19] K. Koyama, U.M. Maurer, T. Okamoto, and S.A. Vanstone, "New Public-Key Schemes Based on Elliptic Curves over the Ring $Z_{n}$ ," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '91), pp. 252-266, 1991.
[20] A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
[21] E. Mykletun, J. Girao, and D. Westhoff, "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC), 2006.
[22] D. Naccache and J. Stern, "A New Public Key Cryptosystem Based on Higher Residues," Proc. ACM Conf. Computer and Comm. Security (CCS '98), pp. 59-66, 1998.
[23] M. Oenen and R. Molva, "Secure Data Aggregation with Multiple Encryption," Proc. European Workshop Wireless Sensor Networks (EWSN '07), Jan. 2007.
[24] P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '99), pp. 223-238, 1999.
[25] P. Paillier, "Trapdooring Discrete Logarithms on Elliptic Curves over Rings," Proc. Ann. Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT '00), pp. 573-584, 2000.
[26] S. Peter, P. Langendörfer, and K. Piotrowski, "On Concealed Data Aggregation for Wireless Sensor Networks," Proc. Fourth IEEE Consumer Comm. and Networking Conf. (CCNC), 2007.
[27] S. Peter, P. Langendörfer, and K. Piotrowski, "Public Key Cryptography Empowered Smart Dust Is Affordable," Int'l J. Sensor Networks, special issue on energy-efficient algorithm and protocol design in sensor networks, vol. 4, nos. 1/2, 2008.
[28] R.L. Rivest, L. Adleman, and M.L. Dertouzous, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation. Academic Press, pp. 169-179, 1978.
[29] T. Okamoto and S. Uchiyama, "A New Public-Key Cryptosystem as Secure as Factoring," Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '98), pp. 308-318, 1998.
[30] R.L. Rivest, L. Adleman, and M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation, pp. 169-179, Academia Press, 1978.
[31] C. Wagner, "Cryptoanalysis of an Algebraic Privacy Homomorphism," Proc. Sixth Information Security Conf. (ISC '03), Oct. 2003.
[32] D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-Distribution and Routing," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool