Secure Data Aggregation in Wireless Sensor Networks Using Privacy Homomorphism

作者: M. K. Sandhya , K. Murugan

DOI: 10.1007/978-3-642-17878-8_49

关键词: Overhead (computing)Wireless sensor networkKey distribution in wireless sensor networksHomomorphismData aggregatorComputer scienceHomomorphic encryptionEncryptionComputer networkSymmetric-key algorithm

摘要: Data aggregation is a complex task in wireless sensor networks because of its limited power and computing capabilities. Due to large scale deployment nodes for various applications, multiple are required aggregate the relevant information from huge data sets. This process vulnerable many security threats due loss cryptographic keys, node compromise etc. eventually leads breach confidentiality. In this paper we propose scheme called Secure Aggregation using Privacy Homomorphism (SDAPH) which offers high degree confidentiality through encrypted processing. It has lesser overhead as it uses additive privacy homomorphism symmetric key homomorphic encryption technique.

参考文章(10)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
A. C.-F. Chan, Symmetric-Key Homomorphic Encryption for Encrypted Data Processing international conference on communications. pp. 774- 778 ,(2009) , 10.1109/ICC.2009.5199505
Bartosz Przydatek, Dawn Song, Adrian Perrig, SIA: secure information aggregation in sensor networks international conference on embedded networked sensor systems. pp. 255- 265 ,(2003) , 10.1145/958491.958521
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao, SDAP: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '06. pp. 356- 367 ,(2006) , 10.1145/1132905.1132944
Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Song, SIA: Secure information aggregation in sensor networks security of ad hoc and sensor networks. ,vol. 15, pp. 69- 102 ,(2007) , 10.3233/JCS-2007-15104
Josep Domingo-Ferrer, A Provably Secure Additive and Multiplicative Privacy Homomorphism international conference on information security. ,vol. 5, pp. 471- 483 ,(2002) , 10.1007/3-540-45811-5_37
Lingxuan Hu, D. Evans, Secure aggregation for wireless networks symposium on applications and the internet. pp. 384- 391 ,(2003) , 10.1109/SAINTW.2003.1210191
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks global communications conference. ,vol. 3, pp. 1435- 1439 ,(2003) , 10.1109/GLOCOM.2003.1258475
J. Girao, D. Westhoff, M. Schneider, CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks international conference on communications. ,vol. 5, pp. 3044- 3049 ,(2005) , 10.1109/ICC.2005.1494953
Kui Wu, Dennis Dreef, Bo Sun, Yang Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks ad hoc networks. ,vol. 5, pp. 100- 111 ,(2007) , 10.1016/J.ADHOC.2006.05.009