Skip to main content
Erschienen in: Wireless Personal Communications 2/2015

01.01.2015

Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption

verfasst von: Soufiene Ben Othman, Abdullah Ali Bahattab, Abdelbasset Trad, Habib Youssef

Erschienen in: Wireless Personal Communications | Ausgabe 2/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data confidentiality and integrity is mounting a challenge. The existing solutions either have large communication and computation overheads or produce inaccurate results. This paper proposes a novel secure data aggregation scheme based on homomorphic encryption in WSNs. The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic signature to check the aggregation data integrity. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. Simulation results and performance analysis show that our mechanism requires less communication and computation overheads than previously known methods. It can effectively preserve data privacy, check data integrity, and achieve high data transmission efficiency. Also, it performs accurate data aggregation rate while consuming less energy to prolong network lifetime.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vuran, M. C., & Akylidiz, I. F. (2010). Wireless sensor networks. New York: Wiley. Vuran, M. C., & Akylidiz, I. F. (2010). Wireless sensor networks. New York: Wiley.
2.
Zurück zum Zitat Hara, T., Zadorozhny, V. I., & Buchmann, E. (2010). Wireless sensor network technologies for the information explosion era, vol. 278. Stud. Comput. Intell. Berlin:Springer. Hara, T., Zadorozhny, V. I., & Buchmann, E. (2010). Wireless sensor network technologies for the information explosion era, vol. 278. Stud. Comput. Intell. Berlin:Springer.
3.
Zurück zum Zitat Alkhatib, A. A. A., Baicher, G. S., & Darwish, W. K. (January 2013). Wireless Sensor Network—An Advanced Survey. International Journal of Engineering and Innovative Technology (IJEIT), 2(7), 355–369. Alkhatib, A. A. A., Baicher, G. S., & Darwish, W. K. (January 2013). Wireless Sensor Network—An Advanced Survey. International Journal of Engineering and Innovative Technology (IJEIT), 2(7), 355–369.
4.
Zurück zum Zitat Kafetzoglou, S., & Papavassiliou, S. (2011). Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies, International Journal of Sensor Networks, Inderscience Enterprises Ltd., Vol. 10. Kafetzoglou, S., & Papavassiliou, S. (2011). Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies, International Journal of Sensor Networks, Inderscience Enterprises Ltd., Vol. 10.
5.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef
6.
Zurück zum Zitat Schmitt, C., & Carle, G. (January 2010). Applications for Wireless Sensor Networks. in Chapter in Book: Handbook of research on P2P and grid systems for service- oriented computing: Models, methodologies and applications, Antonopoulos Information Science Publishing. Schmitt, C., & Carle, G. (January 2010). Applications for Wireless Sensor Networks. in Chapter in Book: Handbook of research on P2P and grid systems for service- oriented computing: Models, methodologies and applications, Antonopoulos Information Science Publishing.
7.
Zurück zum Zitat Xu, X. (Jan. 2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175. Xu, X. (Jan. 2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175.
8.
Zurück zum Zitat Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef
9.
Zurück zum Zitat Maraiya, K., Kant, K., & Gupta, N. (2011). Wireless Sensor Network: A review on data aggregation. International Journal of Scientific & Engineering Research, 2(4), 1–6. Maraiya, K., Kant, K., & Gupta, N. (2011). Wireless Sensor Network: A review on data aggregation. International Journal of Scientific & Engineering Research, 2(4), 1–6.
10.
Zurück zum Zitat Zheng, J., Xu, X., & Wang, G. (2011). Energy efficient data aggregation scheduling in wireless sensor networks. IEEE 10th international conference on trust, security and privacy in computing and communications, pp. 1662–1667. Zheng, J., Xu, X., & Wang, G. (2011). Energy efficient data aggregation scheduling in wireless sensor networks. IEEE 10th international conference on trust, security and privacy in computing and communications, pp. 1662–1667.
11.
Zurück zum Zitat Chaudhary, S., Singh, N., & Pathak, A. (2012). Energy efficient techniques for data aggregation and collection in WSN energy. IJCSEA, 2(4), 37–47.CrossRef Chaudhary, S., Singh, N., & Pathak, A. (2012). Energy efficient techniques for data aggregation and collection in WSN energy. IJCSEA, 2(4), 37–47.CrossRef
12.
Zurück zum Zitat Nithyakalyani, S., & SureshKumar, S. (2012). Optimal clustering algorithm for energy efficient data aggregation in WSN. European Journal of Scientific Research, 78(1), 146–155. Nithyakalyani, S., & SureshKumar, S. (2012). Optimal clustering algorithm for energy efficient data aggregation in WSN. European Journal of Scientific Research, 78(1), 146–155.
13.
Zurück zum Zitat Sethi, H., Prasad, D., & Patel, R. B. (May 2012). EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. IJCA, 22(7), 20–25. Sethi, H., Prasad, D., & Patel, R. B. (May 2012). EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. IJCA, 22(7), 20–25.
14.
Zurück zum Zitat Mathapati, B. S., & Patil, S. R. (2012). A reliable data aggregation forwarding protocol for wireless sensor networks. IJCSNS, 12(5), 90–95. Mathapati, B. S., & Patil, S. R. (2012). A reliable data aggregation forwarding protocol for wireless sensor networks. IJCSNS, 12(5), 90–95.
15.
Zurück zum Zitat Prakash, G. L., Thejaswini, M., Manjula, S. H., Venugopal, K. R., & Patnaik, L. M. (2009). Secure data aggregation using clusters in sensor networks: World academy of science. Engnieering and Technology, 51, 32–35. Prakash, G. L., Thejaswini, M., Manjula, S. H., Venugopal, K. R., & Patnaik, L. M. (2009). Secure data aggregation using clusters in sensor networks: World academy of science. Engnieering and Technology, 51, 32–35.
16.
Zurück zum Zitat Jacques, M. B., Christophe, G., & Abdallah, M. (2010). Efficient and robust secure aggregation of encrypted data in sensor networks. In 10th Proceeding of the 2010 4th international conference on sensor technologies and applications, (SENSORCOMM), Washington, DC, USA. Jacques, M. B., Christophe, G., & Abdallah, M. (2010). Efficient and robust secure aggregation of encrypted data in sensor networks. In 10th Proceeding of the 2010 4th international conference on sensor technologies and applications, (SENSORCOMM), Washington, DC, USA.
17.
Zurück zum Zitat Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Journal of ACM Transactions on Sensor Networks, 5(3), 1–36. Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Journal of ACM Transactions on Sensor Networks, 5(3), 1–36.
18.
Zurück zum Zitat Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2009). Secure encrypted-data aggregation for wireless sensor networks. Berlin: Springer Science, Business Media, LLC. Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2009). Secure encrypted-data aggregation for wireless sensor networks. Berlin: Springer Science, Business Media, LLC.
19.
Zurück zum Zitat Suat, O., & Hasan, C. (2010). Integration of False data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749. Suat, O., & Hasan, C. (2010). Integration of False data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.
20.
Zurück zum Zitat Xiaodong, L., Rongxing, L., & Xuemin, S. (2010). MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communication Mobile Computing, 10(6), 843–856. Xiaodong, L., Rongxing, L., & Xuemin, S. (2010). MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communication Mobile Computing, 10(6), 843–856.
21.
Zurück zum Zitat Zhijun, L., & Guang, G. (2010). On data aggregation with secure bloom filter in wireless sensor networks. Technical Report CACR 2010, University of Waterloo, Waterloo, Ontario, Canada. Zhijun, L., & Guang, G. (2010). On data aggregation with secure bloom filter in wireless sensor networks. Technical Report CACR 2010, University of Waterloo, Waterloo, Ontario, Canada.
22.
Zurück zum Zitat Haifeng, U. (2009). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In Proceedings of the 2009 international conference on information processing in sensor networks, (IPSN 2009), Washington, DC, USA, pp. 1–12. Haifeng, U. (2009). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In Proceedings of the 2009 international conference on information processing in sensor networks, (IPSN 2009), Washington, DC, USA, pp. 1–12.
23.
Zurück zum Zitat Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In: Global telecommunications conference, GLOBECOM, pp. 2175–2179. Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In: Global telecommunications conference, GLOBECOM, pp. 2175–2179.
24.
Zurück zum Zitat Khalil, I., & Bagchi, S. (2006). Dependable computing system lab. SECOS: Key Management for Scalable and Energy Efficient Crypto on Sensors. Tech Report, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN. Khalil, I., & Bagchi, S. (2006). Dependable computing system lab. SECOS: Key Management for Scalable and Energy Efficient Crypto on Sensors. Tech Report, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN.
25.
Zurück zum Zitat Abbasi, A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.CrossRef Abbasi, A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.CrossRef
26.
Zurück zum Zitat Hankerson, D., Menezes, A. J., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH Hankerson, D., Menezes, A. J., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH
27.
Zurück zum Zitat Mykletun, E., Girao, J., & Westhoff, D. (June 2006). Public key based cryptoschemes for data concealment in wireless sensor networks. Proceedings of IEEE International Conference on Communications, 5, 2288–2295. Mykletun, E., Girao, J., & Westhoff, D. (June 2006). Public key based cryptoschemes for data concealment in wireless sensor networks. Proceedings of IEEE International Conference on Communications, 5, 2288–2295.
28.
Zurück zum Zitat Pradeepa, K., Anne, W. R., & Duraisamy, S. (2012). Design and implementation issues of clustering in wireless sensor networks. International Journal of Computer Applications, 47(11), 23–28.CrossRef Pradeepa, K., Anne, W. R., & Duraisamy, S. (2012). Design and implementation issues of clustering in wireless sensor networks. International Journal of Computer Applications, 47(11), 23–28.CrossRef
29.
Zurück zum Zitat Ozdemir, S. (July 2007). Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In Proceedings of IEEE international conference on pervasive services, pp. 165–168. Ozdemir, S. (July 2007). Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In Proceedings of IEEE international conference on pervasive services, pp. 165–168.
30.
Zurück zum Zitat Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1–15.CrossRef Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1–15.CrossRef
31.
Zurück zum Zitat Domingo-Ferrer, J. (2003). A provably secure additive and multiplicative privacy homomorphism. In 6th ISC conference, pp. 471–483. Domingo-Ferrer, J. (2003). A provably secure additive and multiplicative privacy homomorphism. In 6th ISC conference, pp. 471–483.
32.
Zurück zum Zitat Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In Proceedings of the Annals International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 98), pp. 308–318. Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In Proceedings of the Annals International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 98), pp. 308–318.
33.
Zurück zum Zitat Okamoto, T., Uchiyama, S., & Fujisaki, E. (2009). Epoc: Efficient probabilistic publickey encryption, Technical Report. Okamoto, T., Uchiyama, S., & Fujisaki, E. (2009). Epoc: Efficient probabilistic publickey encryption, Technical Report.
34.
Zurück zum Zitat Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of EUROCRYPT, 2003, 416–432.MathSciNet Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of EUROCRYPT, 2003, 416–432.MathSciNet
35.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.CrossRef
36.
Zurück zum Zitat Liu, J., Baek, J., Zhou, J., et al. (2010). Efficient online/offline identity-based signature for wireless sensor network. International Journal of Information Security, 9(4), 287–296.CrossRef Liu, J., Baek, J., Zhou, J., et al. (2010). Efficient online/offline identity-based signature for wireless sensor network. International Journal of Information Security, 9(4), 287–296.CrossRef
37.
Zurück zum Zitat Sun, B., Osborne, L., Xiao, Y., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications Magazine, 14(5), 56–63.CrossRef Sun, B., Osborne, L., Xiao, Y., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications Magazine, 14(5), 56–63.CrossRef
38.
Zurück zum Zitat Levis, P., Lee, N., Welsh, M., & Culler, D. (2003). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st international conference on embedded networked sensor systems. ACM, pp. 126–137. Levis, P., Lee, N., Welsh, M., & Culler, D. (2003). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st international conference on embedded networked sensor systems. ACM, pp. 126–137.
39.
Zurück zum Zitat Liu, A., & Ning, P. (April 2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (IPSN 2008), SPOTS Track, pp. 245–256. Liu, A., & Ning, P. (April 2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (IPSN 2008), SPOTS Track, pp. 245–256.
40.
Zurück zum Zitat Li, W., Chou, C., & Lin, Z. (2006). Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks. In Proc. Nat’l Computer Symp. Conf. Li, W., Chou, C., & Lin, Z. (2006). Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks. In Proc. Nat’l Computer Symp. Conf.
41.
Zurück zum Zitat Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE third international conference pervasive computing and communications (PERCOM ’06). Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE third international conference pervasive computing and communications (PERCOM ’06).
42.
Zurück zum Zitat Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34, 591–597.CrossRef Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34, 591–597.CrossRef
43.
Zurück zum Zitat Raghunathan, V., Schurgers, C., Park, S., & Srivastana, M. B. (2002). Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19(2), 40–50.CrossRef Raghunathan, V., Schurgers, C., Park, S., & Srivastana, M. B. (2002). Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19(2), 40–50.CrossRef
44.
Zurück zum Zitat Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.CrossRef
Metadaten
Titel
Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
verfasst von
Soufiene Ben Othman
Abdullah Ali Bahattab
Abdelbasset Trad
Habib Youssef
Publikationsdatum
01.01.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2061-z

Weitere Artikel der Ausgabe 2/2015

Wireless Personal Communications 2/2015 Zur Ausgabe