Secure data aggregation in wireless sensor networks using homomorphic encryption

被引:22
|
作者
Kumar, Manish [1 ]
Verma, Shekhar [1 ]
Lata, Kusum [2 ]
机构
[1] IIIT, IT Dept, Allahabad, Uttar Pradesh, India
[2] IBM Corp, Hyderabad, Andhra Pradesh, India
关键词
wireless sensor network; secure data aggregation; homomorphic encryption; tree-based data aggregation; CONCEALED DATA AGGREGATION;
D O I
10.1080/00207217.2014.936524
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a Wireless Sensor Network (WSN), aggregation exploits the correlation between spatially and temporally proximate sensor data to reduce the total data volume to be transmitted to the sink. Mobile agents (MAs) fit into this paradigm, and data can be aggregated and collected by an MA from different sensor nodes using context specific codes. The MA-based data collection suffers due to large size of a typical WSN and is prone to security problems. In this article, homomorphic encryption in a clustered WSN has been proposed for secure and efficient data collection using MAs. The nodes keep encrypted data that are given to an MA for data aggregation tasks. The MA performs all the data aggregation operations upon encrypted data as it migrates between nodes in a tree-like structure in which the nodes are leafs and the cluster head is the root of the tree. It returns and deposits the encrypted aggregated data to the cluster head after traversing through all the intra cluster nodes over a shortest path route. The homomorphic encryption and aggregation processing in encrypted domain makes the data collection process secure. Simulation results confirm the effectiveness of the proposed secure data aggregation mechanism. In addition to security, MA-based mechanism leads to lesser delay and bandwidth requirements.
引用
收藏
页码:690 / 702
页数:13
相关论文
共 50 条
  • [1] SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS VIA HOMOMORPHIC ENCRYPTION
    Ozdemir, Suat
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2008, 23 (02): : 365 - 373
  • [2] Data Aggregation Using Homomorphic Encryption in Wireless Sensor Networks
    Ramotsoela, T. D.
    Hancke, G. P.
    [J]. 2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [3] Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
    Li, Xing
    Chen, Dexin
    Li, Chunyan
    Wang, Liangmin
    [J]. SENSORS, 2015, 15 (07): : 15952 - 15973
  • [4] An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks
    Zhou, Qiang
    Yang, Geng
    He, Liwen
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [5] Secure data aggregation scheme based on homomorphic MAC for wireless sensor networks
    Zhou, Qiang
    Yang, Geng
    Chen, Lei
    Chen, Zheng-Yu
    Dai, Hua
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (07): : 1743 - 1748
  • [6] Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
    Kumar, Mukesh
    Sethi, Monika
    Rani, Shalli
    Sah, Dipak Kumar
    AlQahtani, Salman A.
    Al-Rakhami, Mabrook S.
    [J]. SENSORS, 2023, 23 (13)
  • [7] A Homomorphic MAC-based Secure Data Aggregation Scheme for Wireless Sensor Networks
    Liu, Yun
    Li, Chaoran
    Zhang, Jing
    Liu, Qing
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2069 - 2077
  • [8] Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
    Katarzyna Kapusta
    Gerard Memmi
    Hassan Noura
    [J]. Annals of Telecommunications, 2019, 74 : 157 - 165
  • [9] Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
    Kapusta, Katarzyna
    Memmi, Gerard
    Noura, Hassan
    [J]. ANNALS OF TELECOMMUNICATIONS, 2019, 74 (3-4) : 157 - 165
  • [10] Secure Homomorphic Aggregation Algorithm of Mixed Operations in Wireless Sensor Networks
    Wei, Juan
    Guo, Shanqing
    Xu, Qiuliang
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1052 - 1056