Aggregation of Encrypted data in Wireless Sensor Networks for Secure Multi-Application Data
نویسندگان
چکیده
--Generally, aggregative operations are algebraic, such as the addition or multiplication of received data, or statistical operation, such as a median, a minimum, or a maximum of a data set. It reduces a large amount of transmission is the most practical technique. Although data aggregation could significantly reduce transmission, it is vulnerable to some attacks. Some of the existing schemes do not provide secure counting. Thus, they may suffer from unauthorized aggregation attacks. We propose a new concealed data aggregation scheme extended from Boneh et al.’s homomorphic public encryption system. The proposed scheme has three contributions. First, it is designed for a multi application environment. The base station extracts application-specific data from aggregated cipher-texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. Keywords---Concealed data aggregation, elliptic curve cryptography, wireless sensor networks
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملEIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملSecure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model
Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. Concealed data aggregation (CDA) schemes that are based on the homomorphic characteristics of a...
متن کاملSecure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. Conventional aggregation functions operate when readings are received in plaintext. If readings are encrypted, aggregation requires decryption creatin...
متن کاملHierarchical Concealed Data Aggregation for Wireless Sensor Networks
In wireless sensor networks, performing data aggregation while preserving data confidentiality is a challenging task. Recently, privacy homomorphism based secure data aggregation schemes have been proposed to achieve seamless integration of data confidentiality and aggregation. If sensor data are encrypted with different keys, however, these schemes do not allow hierarchical data aggregation, t...
متن کامل