CSDL Home IEEE Transactions on Dependable and Secure Computing 2010 vol.7 Issue No.01 - January-March
Issue No.01 - January-March (2010 vol.7)
Steffen Peter , IHP
Dirk Westhoff , NEC Europe Ltd.
Claude Castelluccia , INRIA
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.23
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages are 1) neither keys nor plaintext is available at aggregating nodes, 2) the overall energy consumption of the backbone can be reduced, 3) the system is more flexible with respect to changing routes, and finally 4) the overall system security increases. We provide a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.
Cryptography, wireless sensor networks, convergecast, concealed data aggregation.
Steffen Peter, Dirk Westhoff, Claude Castelluccia, "A Survey on the Encryption of Convergecast Traffic with In-Network Processing", IEEE Transactions on Dependable and Secure Computing, vol.7, no. 1, pp. 20-34, January-March 2010, doi:10.1109/TDSC.2008.23