The Community for Technology Leaders
Green Image
Issue No. 01 - January-March (2010 vol. 7)
ISSN: 1545-5971
pp: 20-34
Dirk Westhoff , NEC Europe Ltd.
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages are 1) neither keys nor plaintext is available at aggregating nodes, 2) the overall energy consumption of the backbone can be reduced, 3) the system is more flexible with respect to changing routes, and finally 4) the overall system security increases. We provide a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.
Cryptography, wireless sensor networks, convergecast, concealed data aggregation.

S. Peter, D. Westhoff and C. Castelluccia, "A Survey on the Encryption of Convergecast Traffic with In-Network Processing," in IEEE Transactions on Dependable and Secure Computing, vol. 7, no. , pp. 20-34, 2008.
79 ms
(Ver 3.3 (11022016))