CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

被引:52
|
作者
Lin, Yue-Hsun [1 ]
Chang, Shih-Ying [2 ]
Sun, Hung-Min [3 ]
机构
[1] Carnegie Mellon Univ, CyLab, Pittsburgh, PA 15213 USA
[2] Ind Technol Res Inst, Informat & Commun Res Labs, Hsinchu 31040, Taiwan
[3] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
关键词
Concealed data aggregation; elliptic curve cryptography; homomorphic encryption; wireless sensor networks; PUBLIC-KEY CRYPTOSYSTEM; PROVABLY SECURE;
D O I
10.1109/TKDE.2012.94
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption. Since aggregators collect data without decryption, adversaries are not able to forge aggregated results by compromising them. However, these schemes are not satisfy multi-application environments. Second, these schemes become insecure in case some sensor nodes are compromised. Third, these schemes do not provide secure counting; thus, they may suffer unauthorized aggregation attacks. Therefore, we propose a new concealed data aggregation scheme extended from Boneh et al.'s homomorphic public encryption system. The proposed scheme has three contributions. First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated ciphertexts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. To prove the proposed scheme's robustness and efficiency, we also conducted the comprehensive analyses and comparisons in the end.
引用
收藏
页码:1471 / 1483
页数:13
相关论文
共 50 条
  • [11] Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
    Ozdemir, Suat
    Xiao, Yang
    COMPUTER NETWORKS, 2011, 55 (08) : 1735 - 1746
  • [12] Energy Efficient Recoverable Concealed Data Aggregation in Wireless Sensor Networks
    Jose, Josna
    Kumar, Manoj S.
    Jose, Joyce
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 322 - 329
  • [13] An Efficient Data Aggregation Scheme in Wireless Sensor Networks
    Wang, Ying
    Li, Guorui
    INTERNET OF THINGS-BK, 2012, 312 : 25 - +
  • [14] A Novel Data Aggregation Scheme for Wireless Sensor Networks
    Shah, Syed Gul
    Ahmed, Atiq
    Ullah, Ihsan
    Noor, Waheed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (02) : 585 - 590
  • [15] A secure data aggregation scheme for wireless sensor networks
    Ren, Shu Qin
    Kim, Dong Seong
    Park, Jong Sou
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 32 - +
  • [16] A novel data aggregation scheme for wireless sensor networks
    Shah S.G.
    Ahmed A.
    Ullah I.
    Noor W.
    International Journal of Advanced Computer Science and Applications, 2019, 10 (02): : 585 - 590
  • [17] Bidirectional data aggregation scheme for wireless sensor networks
    Cho, Sungrae
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 : 595 - 604
  • [18] AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARING
    Horng, Gwoboa
    Wang, Chien-Lung
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (10A): : 3085 - 3097
  • [19] An efficient concealed data aggregation scheme for sensor networks based on secret sharing
    Horng, Gwoboa
    Wang, Chien-Lung
    Chen, Tzung-Her
    International Journal of Innovative Computing, Information and Control, 2009, 5 (10): : 3085 - 3097
  • [20] CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
    Girao, J
    Westhoff, D
    Schneider, M
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3044 - 3049