Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks

被引:0
|
作者
Katarzyna Kapusta
Gerard Memmi
Hassan Noura
机构
[1] LTCI,Department of Electrical and Computer Engineering
[2] Telecom ParisTech,undefined
[3] American University of Beirut,undefined
来源
关键词
Unattended wireless sensor networks; Internet-of-Things; IoT; UWSN; Data fragmentation; Data aggregation; Data protection; Additively homomorphic encryption; Information dispersal;
D O I
暂无
中图分类号
学科分类号
摘要
Data fragmentation and dispersion is recognized as a way of providing confidentiality and availability of data stored inside unattended wireless sensor networks. This paper introduces an additively homomorphic encryption and fragmentation scheme (AHEF). AHEF replaces additively homomorphic secret sharing used in state-of-the-art techniques with additively homomorphic fragmentation. This change has a significant impact on the volume of data stored inside the sensors which in turn supports lower transmission costs. Both, storage and transmission costs are reduced by a factor of at least 2. Moreover, by reducing the number of required computations, AHEF allows sensors to save energy.
引用
收藏
页码:157 / 165
页数:8
相关论文
共 50 条
  • [41] Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation
    Wang, Licheng
    Wang, Lihua
    Pan, Yun
    Zhang, Zonghua
    Yang, Yixian
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 493 - +
  • [42] Epidemic Data Survivability in Unattended Wireless Sensor Networks
    Di Pietro, Roberto
    Verde, Nino Vincenzo
    WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 11 - 22
  • [43] Robust data authentication for unattended wireless sensor networks
    Dahshan, Mostafa H.
    TELECOMMUNICATION SYSTEMS, 2017, 66 (02) : 181 - 196
  • [44] Robust data authentication for unattended wireless sensor networks
    Mostafa H. Dahshan
    Telecommunication Systems, 2017, 66 : 181 - 196
  • [45] Acquiring Authentic Data in Unattended Wireless Sensor Networks
    Yu, Chia-Mu
    Chen, Chi-Yuan
    Lu, Chun-Shien
    Kuo, Sy-Yen
    Chao, Han-Chieh
    SENSORS, 2010, 10 (04) : 2770 - 2792
  • [46] DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
    Reshma, S.
    Shaila, K.
    Venugopal, K. R.
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 635 - 638
  • [47] Analyzing Homomorphic Encryption Schemes in Securing Wireless Sensor Networks (WSN)
    Ertaul, Levent
    Yang, Johan Hadiwijaya
    Saldamli, Gokay
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (05): : 1 - 11
  • [48] An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks
    孟金涛
    苑建蕊
    冯圣中
    魏彦杰
    JournalofComputerScience&Technology, 2013, 28 (03) : 564 - 573
  • [49] An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks
    Meng, Jin-Tao
    Yuan, Jian-Rui
    Feng, Sheng-Zhong
    Wei, Yan-Jie
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (03) : 564 - 573
  • [50] Cluster Trisecting based Data Aggregation Scheme for Wireless Sensor Networks
    Guo, Jianghong
    Chen, Deli
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 914 - 917