Hierarchical Concealed Data Aggregation for Wireless Sensor Networks
نویسندگان
چکیده
In wireless sensor networks, performing data aggregation while preserving data confidentiality is a challenging task. Recently, privacy homomorphism based secure data aggregation schemes have been proposed to achieve seamless integration of data confidentiality and aggregation. If sensor data are encrypted with different keys, however, these schemes do not allow hierarchical data aggregation, thereby limiting the benefit of data aggregation. This paper presents a novel hierarchial concealed data aggregation protocol that allows the aggregation of data packets which are encrypted with different keys. Hence, regardless of the encryption key, data collected from all sensor nodes can be aggregated without violating data confidentiality. Moreover, during the decryption of aggregated data, the base station is able to classify sensor data based on the encryption key.
منابع مشابه
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملIntegrity protecting hierarchical concealed data aggregation for wireless sensor networks
In wireless sensor networks, performing data aggregation while preserving data confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure data aggregation schemes have been proposed to seamlessly integrate confidentiality and data aggregation. However, these schemes do not provide data integrity or allow hierarchical data aggregation if more than one encryption ke...
متن کاملConcealed data aggregation in wireless sensor networks: A comprehensive survey
The objectives of concealed data aggregation are to provide end-to-end privacy and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used for realizing these objectives together. Although privacy homomorphism achieves the conflicting objectives, such as privacy and data aggregation, it negatively affects other security objectives such a...
متن کاملA New Protocol for Concealed Data Aggregation in Wireless Sensor Networks
Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new...
متن کاملMLCA: A Multi-Level Clustering Algorithm for Routing in Wireless Sensor Networks
Energy constraint is the biggest challenge in wireless sensor networks because the power supply of each sensor node is a battery that is not rechargeable or replaceable due to the applications of these networks. One of the successful methods for saving energy in these networks is clustering. It has caused that cluster-based routing algorithms are successful routing algorithm for these networks....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009