Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation
Issue No. 10 - October (2006 vol. 5)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TMC.2006.144
Routing in wireless sensor networks is different from that in commonsense mobile ad-hoc networks. It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem. To save the overall energy resources of the network, sensed data needs to be consolidated and aggregated on its way to the final destination. We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating intermediate nodes are not required to operate on the sensed plaintext data. We apply a particular class of encryption transformations and discuss techniques for computing the aggregation functions "average" and "movement detection." We show that the approach is feasible for the class of "going down" routing protocols. We consider the risk of corrupted sensor nodes by proposing a key predistribution algorithm that limits an attacker's gain and show how key predistribution and a key-ID sensitive "going down" routing protocol help increase the robustness and reliability of the connected backbone
cryptography, multicast communication, routing protocols, telecommunication network reliability, telecommunication traffic, wireless sensor networks,concealed data aggregation, reverse multicast traffic, wireless sensor networks, end-to-end encryption, key distribution, routing adaptation, energy resources, in-network data aggregation, encryption transformations, movement detection, key-ID sensitive going down routing protocol, corrupted sensor nodes,Telecommunication traffic, Intelligent networks, Cryptography, Wireless sensor networks, Spine, Biomedical monitoring, Ad hoc networks, Routing protocols, Robustness, Mobile communication,Wireless sensor networks, data encryption, data aggregation, robustness and reliability, privacy homomorphism, key predistribution.
"Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation", IEEE Transactions on Mobile Computing, vol. 5, no. , pp. 1417-1431, October 2006, doi:10.1109/TMC.2006.144