Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks

被引:46
|
作者
Cui, Jie [1 ]
Shao, Lili [1 ]
Zhong, Hong [1 ]
Xu, Yan [1 ]
Liu, Lu [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Univ Derby, Dept Elect Comp & Math, Derby DE22 1GB, England
基金
中国国家自然科学基金;
关键词
Data aggregation; Confidentiality; Integrity; Homomorphic encryption; Large-scale wireless sensor networks; CONCEALED DATA AGGREGATION; SCHEME;
D O I
10.1007/s12083-017-0581-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.
引用
收藏
页码:1022 / 1037
页数:16
相关论文
共 50 条
  • [31] Probabilistic Estimation of End-to-End Path Latency in Wireless Sensor Networks
    Oliver, Ramon Sema
    Fohler, Gerhard
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 614 - 622
  • [32] End-to-End Delay Constrained Routing and Scheduling for Wireless Sensor Networks
    Wang, Qing
    Fan, Pingyi
    Wu, Dapeng Oliver
    Ben Letaief, Khaled
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [33] End-to-End Delay Measurement in Wireless Sensor Networks without Synchronization
    Liu, Kebin
    Ma, Qiang
    Liu, Haoxiang
    Cao, Zhichao
    Liu, Yunhao
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 583 - 591
  • [34] End-to-End Delay Analysis in Wireless Sensor Networks with Service Vacation
    Alabdulmohsin, Ibrahim
    Hyadi, Amal
    Afify, Laila
    Shihada, Basem
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2799 - 2804
  • [35] End-to-End Reliability-Aware Scheduling for Wireless Sensor Networks
    Dobslaw, Felix
    Zhang, Tingting
    Gidlund, Mikael
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) : 758 - 767
  • [36] An End-to-End Performance Meter for Applications in Wireless Body Sensor Networks
    Orhan, Ibrahim
    Gonga, Antonio
    Lindh, Thomas
    2008 5TH INTERNATIONAL SUMMER SCHOOL AND SYMPOSIUM ON MEDICAL DEVICES AND BIOSENSORS, 2008, : 295 - +
  • [37] A Comprehensive Analysis of the End-to-End Delay for Wireless Multimedia Sensor Networks
    Abbas, Nasim
    Yu, Fengqi
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (06) : 2456 - 2467
  • [38] Semantic Communication-Aware End-to-End Routing in Large-Scale LEO Satellite Networks
    Guo, Binquan
    Xiong, Zehui
    Wang, Bo
    Quek, Tony Q. S.
    Han, Zhu
    2024 IEEE INTERNATIONAL CONFERENCE ON METAVERSE COMPUTING, NETWORKING, AND APPLICATIONS, METACOM 2024, 2024, : 137 - 142
  • [39] From Pixels to Buildings: End-to-end Probabilistic Deep Networks for Large-scale Semantic Mapping
    Zheng, Kaiyu
    Pronobis, Andrzej
    2019 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2019, : 3511 - 3518
  • [40] CONFIDENTIALITY AND INTEGRITY FOR SUM AGGREGATION IN SENSOR NETWORKS
    Frikken, Keith B.
    Zhang, Yihua
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 231 - 240