The Community for Technology Leaders
RSS Icon
Issue No.04 - April (2012 vol.23)
pp: 727-734
Chien-Ming Chen , National Tsing Hua University, Hsinchu
Yue-Hsun Lin , National Tsing Hua University, Hsinchu
Ya-Ching Lin , National Tsing Hua University, Hsinchu
Hung-Min Sun , National Tsing Hua University, Hsinchu
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable.” Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.
Concealed data aggregation, wireless sensor networks, privacy homomorphism encryption.
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Min Sun, "RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 4, pp. 727-734, April 2012, doi:10.1109/TPDS.2011.219
[1] R. Rajagopalan and P. Varshney, "Data-Aggregation Techniques in Sensor Networks: A Survey," IEEE Comm. Surveys Tutorials, vol. 8, no. 4, pp. 48-63, Oct.-Nov. 2006.
[2] S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, "TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks," Proc. Fifth Symp. Operating Systems Design and Implementation, 2002.
[3] J.-Y. Chen, G. Pandurangan, and D. Xu, "Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp. 987-1000, Sept. 2006.
[4] H. Çam, S. Özdemir, P. Nair, D. Muthuavinashiappan, and H. Ozgur Sanli, "Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks," J. Computer Comm., vol. 29, pp. 446-455, 2006.
[5] H. Sanli, S. Ozdemir, and H. Cam, "SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks," Proc. IEEE 60th Int'l Conf. Vehicular Technology (VTC '04-Fall), vol. 7, pp. 4650-4654, Sept. 2004.
[6] D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
[7] C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems, pp. 109-117, July 2005.
[8] E. Mykletun, J. Girao, and D. Westhoff, "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm., vol. 5, pp. 2288-2295, June 2006.
[9] H. Chan, A. Perrig, and D. Song, "Secure Hierarchical In-Network Aggregation in Sensor Networks," Proc. ACM 13th Conf. Computer and Comm. Security, pp. 278-287, 2006.
[10] Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," ACM Trans. Information and System Security (TISSEC), vol. 11, no. 4, pp. 1-43, 2008.
[11] S. Roy, S. Setia, and S. Jajodia, "Attack-Resilient Hierarchical Data Aggregation in Sensor Networks," Proc. ACM Fourth Workshop Security of Ad Hoc and Sensor Networks, pp. 71-82, 2006.
[12] H. Yu, "Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks via Set Sampling," Proc. IEEE Int'l Conf. Information Processing in Sensor Networks, pp. 1-12, 2009.
[13] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), pp. 416-432, 2003.
[14] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
[15] M. Demirbas, A. Arora, V. Mittal, and V. Kulathumani, "A Fault-Local Self-Stabilizing Clustering Service for Wireless Ad Hoc Networks," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp. 912-922, Sept. 2006.
[16] S. Basagni, M. Mastrogiovanni, A. Panconesi, and C. Petrioli, "Localized Protocols for Ad Hoc Clustering and Backbone Formation: A Performance Comparison," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 4, pp. 292-306, Apr. 2006.
[17] J. Pollard, "Monte Carlo Methods for Index Computation (mod p)," Math. of Computation, vol. 32, pp. 918-924, 1978.
[18] S. Ozdemir, "Concealed Data Aggregation in Heterogeneous Sensor Networks Using Privacy Homomorphism," Proc. IEEE Int'l Conf. Pervasive Services, pp. 165-168, July 2007.
[19] C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Proc. IEEE First Int'l Workshop Sensor Network Protocols and Applications, pp. 113-127, May 2003.
[20] B. Yu and B. Xiao, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks," Proc. IEEE 20th Int'l Symp. Parallel and Distributed Processing (IPDPS' 06), Apr. 2006.
[21] T.H. Hai and E.-N. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-Hops Neighbor Knowledge," Proc. IEEE Seventh Int'l Symp. Network Computing and Applications, pp. 325-331, July 2008.
[22] W. Li, C. Chou, and Z. Lin, "Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks," Proc. Nat'l Computer Symp. Conf., 2006.
[23] L. Oliveira et al., "TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks," Computer Comm., vol. 34, pp. 485-493, vol. 34, 2010.
[24] A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. (PERCOM '06), 2005.
[25] G. De Meulenaer, F. Gosset, F.X. Standaert, and L. Vandendorpe, "On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm., pp. 580-585, 2008.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool