Concealed Data Aggregation Scheme for Wireless Sensor Network Applications
نویسندگان
چکیده
Data aggregation scheme is a technique which reduces the large amount of transmission in wireless sensor networks. In the existing system, homomorphic encryptions are used to conceal communication during aggregation. The enciphered data can be aggregated algebraically without decryption, hence compromising the security issues and adversaries are able to collect valuable data. Hence these schemes become insecure in case some sensor nodes are compromised, it does not satisfy multi-application environment and they do not provide secure counting which may lead to unauthorized aggregation attacks. Therefore , we propose a new concealed data aggregation scheme extended from Boneh et al.’s homomorphic public encryption system. First, it is designed for a multiapplication environment. The base station extracts application-specific data from aggregated cipher texts. Secondly it reduces the impact of compromising attacks. Finally, it degrades the damage from unauthorized aggregations, hence providing the security. Keywords— Wireless Sensor Network, Concealed Data Aggregation, Homomorphic Encryption, CDAMA, Secure Counting.
منابع مشابه
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملConcealed data aggregation in wireless sensor networks: A comprehensive survey
The objectives of concealed data aggregation are to provide end-to-end privacy and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used for realizing these objectives together. Although privacy homomorphism achieves the conflicting objectives, such as privacy and data aggregation, it negatively affects other security objectives such a...
متن کاملConcealed Data Aggregation with Dynamic Intrusion Detection System to Remove Vulnerabilities in Wireless Sensor Networks
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for concealing statement during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not applicable for mu...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کامل