Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs)
نویسندگان
چکیده
Data aggregation in wireless sensor networks (WSN) helps eliminate information redundancy and increase the lifetime of the network. When homomorphic encryption is used for data aggregation, end-to-end encryption is achieved and aggregation function like average or minimum/maximum can be computed on the encrypted data. Aggregation functions like minimum/maximum rely on comparison operation. But, it has been shown that any homomorphic encryption is insecure against ciphertext only attacks if they support comparison operation. The order preserving encryption scheme (OPES) has been suggested for WSNs, for secure comparison of encrypted data at the aggregator node in WSNs. But, the computational cost at the sensor nodes in WSNs by using OPES is huge. This paper provides an alternative for OPES when used to calculate aggregation function minimum/maximum. In this paper we briefly describe some homomorphic encryption schemes and show how the sensed data is encrypted by using these homomorphic encryption schemes. we show how aggregation function minimum/maximum can be computed at the aggregator node in WSNs by performing addition operation and not comparison operation on the data encrypted with homomorphic encryption schemes. We also show how our scheme helps eliminate the encryption cost at the sensor node in WSNs.
منابع مشابه
Evaluating Homomorphic Encryption Algorithms for Privacy in Wireless Sensor Networks
The Wireless Sensor Networks (WSNs) consist of the sensor nodes those are severely resource constrained. Hence, the protocols devised for the WSNs employ every possible means of optimizing the associated overhead.The WSNs typically, employ in-network processing that is largely based on the data aggregation operations that aggregate the data into a compact representation for further transmission...
متن کاملAsymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey
The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained W...
متن کاملCongestion Control Approaches Applied to Wireless Sensor Networks: A Survey
Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...
متن کاملSecure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model
Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. Concealed data aggregation (CDA) schemes that are based on the homomorphic characteristics of a...
متن کامل3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
متن کامل