Skip to main content
Top
Published in: Wireless Personal Communications 2/2015

01-01-2015

Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption

Authors: Soufiene Ben Othman, Abdullah Ali Bahattab, Abdelbasset Trad, Habib Youssef

Published in: Wireless Personal Communications | Issue 2/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data confidentiality and integrity is mounting a challenge. The existing solutions either have large communication and computation overheads or produce inaccurate results. This paper proposes a novel secure data aggregation scheme based on homomorphic encryption in WSNs. The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic signature to check the aggregation data integrity. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. Simulation results and performance analysis show that our mechanism requires less communication and computation overheads than previously known methods. It can effectively preserve data privacy, check data integrity, and achieve high data transmission efficiency. Also, it performs accurate data aggregation rate while consuming less energy to prolong network lifetime.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Vuran, M. C., & Akylidiz, I. F. (2010). Wireless sensor networks. New York: Wiley. Vuran, M. C., & Akylidiz, I. F. (2010). Wireless sensor networks. New York: Wiley.
2.
go back to reference Hara, T., Zadorozhny, V. I., & Buchmann, E. (2010). Wireless sensor network technologies for the information explosion era, vol. 278. Stud. Comput. Intell. Berlin:Springer. Hara, T., Zadorozhny, V. I., & Buchmann, E. (2010). Wireless sensor network technologies for the information explosion era, vol. 278. Stud. Comput. Intell. Berlin:Springer.
3.
go back to reference Alkhatib, A. A. A., Baicher, G. S., & Darwish, W. K. (January 2013). Wireless Sensor Network—An Advanced Survey. International Journal of Engineering and Innovative Technology (IJEIT), 2(7), 355–369. Alkhatib, A. A. A., Baicher, G. S., & Darwish, W. K. (January 2013). Wireless Sensor Network—An Advanced Survey. International Journal of Engineering and Innovative Technology (IJEIT), 2(7), 355–369.
4.
go back to reference Kafetzoglou, S., & Papavassiliou, S. (2011). Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies, International Journal of Sensor Networks, Inderscience Enterprises Ltd., Vol. 10. Kafetzoglou, S., & Papavassiliou, S. (2011). Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies, International Journal of Sensor Networks, Inderscience Enterprises Ltd., Vol. 10.
5.
go back to reference Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef
6.
go back to reference Schmitt, C., & Carle, G. (January 2010). Applications for Wireless Sensor Networks. in Chapter in Book: Handbook of research on P2P and grid systems for service- oriented computing: Models, methodologies and applications, Antonopoulos Information Science Publishing. Schmitt, C., & Carle, G. (January 2010). Applications for Wireless Sensor Networks. in Chapter in Book: Handbook of research on P2P and grid systems for service- oriented computing: Models, methodologies and applications, Antonopoulos Information Science Publishing.
7.
go back to reference Xu, X. (Jan. 2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175. Xu, X. (Jan. 2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175.
8.
go back to reference Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef
9.
go back to reference Maraiya, K., Kant, K., & Gupta, N. (2011). Wireless Sensor Network: A review on data aggregation. International Journal of Scientific & Engineering Research, 2(4), 1–6. Maraiya, K., Kant, K., & Gupta, N. (2011). Wireless Sensor Network: A review on data aggregation. International Journal of Scientific & Engineering Research, 2(4), 1–6.
10.
go back to reference Zheng, J., Xu, X., & Wang, G. (2011). Energy efficient data aggregation scheduling in wireless sensor networks. IEEE 10th international conference on trust, security and privacy in computing and communications, pp. 1662–1667. Zheng, J., Xu, X., & Wang, G. (2011). Energy efficient data aggregation scheduling in wireless sensor networks. IEEE 10th international conference on trust, security and privacy in computing and communications, pp. 1662–1667.
11.
go back to reference Chaudhary, S., Singh, N., & Pathak, A. (2012). Energy efficient techniques for data aggregation and collection in WSN energy. IJCSEA, 2(4), 37–47.CrossRef Chaudhary, S., Singh, N., & Pathak, A. (2012). Energy efficient techniques for data aggregation and collection in WSN energy. IJCSEA, 2(4), 37–47.CrossRef
12.
go back to reference Nithyakalyani, S., & SureshKumar, S. (2012). Optimal clustering algorithm for energy efficient data aggregation in WSN. European Journal of Scientific Research, 78(1), 146–155. Nithyakalyani, S., & SureshKumar, S. (2012). Optimal clustering algorithm for energy efficient data aggregation in WSN. European Journal of Scientific Research, 78(1), 146–155.
13.
go back to reference Sethi, H., Prasad, D., & Patel, R. B. (May 2012). EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. IJCA, 22(7), 20–25. Sethi, H., Prasad, D., & Patel, R. B. (May 2012). EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. IJCA, 22(7), 20–25.
14.
go back to reference Mathapati, B. S., & Patil, S. R. (2012). A reliable data aggregation forwarding protocol for wireless sensor networks. IJCSNS, 12(5), 90–95. Mathapati, B. S., & Patil, S. R. (2012). A reliable data aggregation forwarding protocol for wireless sensor networks. IJCSNS, 12(5), 90–95.
15.
go back to reference Prakash, G. L., Thejaswini, M., Manjula, S. H., Venugopal, K. R., & Patnaik, L. M. (2009). Secure data aggregation using clusters in sensor networks: World academy of science. Engnieering and Technology, 51, 32–35. Prakash, G. L., Thejaswini, M., Manjula, S. H., Venugopal, K. R., & Patnaik, L. M. (2009). Secure data aggregation using clusters in sensor networks: World academy of science. Engnieering and Technology, 51, 32–35.
16.
go back to reference Jacques, M. B., Christophe, G., & Abdallah, M. (2010). Efficient and robust secure aggregation of encrypted data in sensor networks. In 10th Proceeding of the 2010 4th international conference on sensor technologies and applications, (SENSORCOMM), Washington, DC, USA. Jacques, M. B., Christophe, G., & Abdallah, M. (2010). Efficient and robust secure aggregation of encrypted data in sensor networks. In 10th Proceeding of the 2010 4th international conference on sensor technologies and applications, (SENSORCOMM), Washington, DC, USA.
17.
go back to reference Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Journal of ACM Transactions on Sensor Networks, 5(3), 1–36. Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Journal of ACM Transactions on Sensor Networks, 5(3), 1–36.
18.
go back to reference Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2009). Secure encrypted-data aggregation for wireless sensor networks. Berlin: Springer Science, Business Media, LLC. Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2009). Secure encrypted-data aggregation for wireless sensor networks. Berlin: Springer Science, Business Media, LLC.
19.
go back to reference Suat, O., & Hasan, C. (2010). Integration of False data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749. Suat, O., & Hasan, C. (2010). Integration of False data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.
20.
go back to reference Xiaodong, L., Rongxing, L., & Xuemin, S. (2010). MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communication Mobile Computing, 10(6), 843–856. Xiaodong, L., Rongxing, L., & Xuemin, S. (2010). MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communication Mobile Computing, 10(6), 843–856.
21.
go back to reference Zhijun, L., & Guang, G. (2010). On data aggregation with secure bloom filter in wireless sensor networks. Technical Report CACR 2010, University of Waterloo, Waterloo, Ontario, Canada. Zhijun, L., & Guang, G. (2010). On data aggregation with secure bloom filter in wireless sensor networks. Technical Report CACR 2010, University of Waterloo, Waterloo, Ontario, Canada.
22.
go back to reference Haifeng, U. (2009). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In Proceedings of the 2009 international conference on information processing in sensor networks, (IPSN 2009), Washington, DC, USA, pp. 1–12. Haifeng, U. (2009). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In Proceedings of the 2009 international conference on information processing in sensor networks, (IPSN 2009), Washington, DC, USA, pp. 1–12.
23.
go back to reference Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In: Global telecommunications conference, GLOBECOM, pp. 2175–2179. Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In: Global telecommunications conference, GLOBECOM, pp. 2175–2179.
24.
go back to reference Khalil, I., & Bagchi, S. (2006). Dependable computing system lab. SECOS: Key Management for Scalable and Energy Efficient Crypto on Sensors. Tech Report, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN. Khalil, I., & Bagchi, S. (2006). Dependable computing system lab. SECOS: Key Management for Scalable and Energy Efficient Crypto on Sensors. Tech Report, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN.
25.
go back to reference Abbasi, A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.CrossRef Abbasi, A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.CrossRef
26.
go back to reference Hankerson, D., Menezes, A. J., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH Hankerson, D., Menezes, A. J., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH
27.
go back to reference Mykletun, E., Girao, J., & Westhoff, D. (June 2006). Public key based cryptoschemes for data concealment in wireless sensor networks. Proceedings of IEEE International Conference on Communications, 5, 2288–2295. Mykletun, E., Girao, J., & Westhoff, D. (June 2006). Public key based cryptoschemes for data concealment in wireless sensor networks. Proceedings of IEEE International Conference on Communications, 5, 2288–2295.
28.
go back to reference Pradeepa, K., Anne, W. R., & Duraisamy, S. (2012). Design and implementation issues of clustering in wireless sensor networks. International Journal of Computer Applications, 47(11), 23–28.CrossRef Pradeepa, K., Anne, W. R., & Duraisamy, S. (2012). Design and implementation issues of clustering in wireless sensor networks. International Journal of Computer Applications, 47(11), 23–28.CrossRef
29.
go back to reference Ozdemir, S. (July 2007). Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In Proceedings of IEEE international conference on pervasive services, pp. 165–168. Ozdemir, S. (July 2007). Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In Proceedings of IEEE international conference on pervasive services, pp. 165–168.
30.
go back to reference Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1–15.CrossRef Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1–15.CrossRef
31.
go back to reference Domingo-Ferrer, J. (2003). A provably secure additive and multiplicative privacy homomorphism. In 6th ISC conference, pp. 471–483. Domingo-Ferrer, J. (2003). A provably secure additive and multiplicative privacy homomorphism. In 6th ISC conference, pp. 471–483.
32.
go back to reference Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In Proceedings of the Annals International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 98), pp. 308–318. Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In Proceedings of the Annals International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 98), pp. 308–318.
33.
go back to reference Okamoto, T., Uchiyama, S., & Fujisaki, E. (2009). Epoc: Efficient probabilistic publickey encryption, Technical Report. Okamoto, T., Uchiyama, S., & Fujisaki, E. (2009). Epoc: Efficient probabilistic publickey encryption, Technical Report.
34.
go back to reference Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of EUROCRYPT, 2003, 416–432.MathSciNet Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of EUROCRYPT, 2003, 416–432.MathSciNet
35.
go back to reference Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.CrossRef
36.
go back to reference Liu, J., Baek, J., Zhou, J., et al. (2010). Efficient online/offline identity-based signature for wireless sensor network. International Journal of Information Security, 9(4), 287–296.CrossRef Liu, J., Baek, J., Zhou, J., et al. (2010). Efficient online/offline identity-based signature for wireless sensor network. International Journal of Information Security, 9(4), 287–296.CrossRef
37.
go back to reference Sun, B., Osborne, L., Xiao, Y., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications Magazine, 14(5), 56–63.CrossRef Sun, B., Osborne, L., Xiao, Y., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications Magazine, 14(5), 56–63.CrossRef
38.
go back to reference Levis, P., Lee, N., Welsh, M., & Culler, D. (2003). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st international conference on embedded networked sensor systems. ACM, pp. 126–137. Levis, P., Lee, N., Welsh, M., & Culler, D. (2003). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st international conference on embedded networked sensor systems. ACM, pp. 126–137.
39.
go back to reference Liu, A., & Ning, P. (April 2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (IPSN 2008), SPOTS Track, pp. 245–256. Liu, A., & Ning, P. (April 2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (IPSN 2008), SPOTS Track, pp. 245–256.
40.
go back to reference Li, W., Chou, C., & Lin, Z. (2006). Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks. In Proc. Nat’l Computer Symp. Conf. Li, W., Chou, C., & Lin, Z. (2006). Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks. In Proc. Nat’l Computer Symp. Conf.
41.
go back to reference Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE third international conference pervasive computing and communications (PERCOM ’06). Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE third international conference pervasive computing and communications (PERCOM ’06).
42.
go back to reference Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34, 591–597.CrossRef Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34, 591–597.CrossRef
43.
go back to reference Raghunathan, V., Schurgers, C., Park, S., & Srivastana, M. B. (2002). Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19(2), 40–50.CrossRef Raghunathan, V., Schurgers, C., Park, S., & Srivastana, M. B. (2002). Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19(2), 40–50.CrossRef
44.
go back to reference Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef
Metadata
Title
Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
Authors
Soufiene Ben Othman
Abdullah Ali Bahattab
Abdelbasset Trad
Habib Youssef
Publication date
01-01-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2061-z

Other articles of this Issue 2/2015

Wireless Personal Communications 2/2015 Go to the issue