Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

被引:102
|
作者
Ozdemir, Suat [1 ]
Xiao, Yang [2 ]
机构
[1] Gazi Univ, Dept Comp Engn, TR-06570 Ankara, Turkey
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
基金
美国国家科学基金会;
关键词
Data integrity; Data confidentiality; Concealed data aggregation; Wireless sensor networks;
D O I
10.1016/j.comnet.2011.01.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, performing data aggregation while preserving data confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure data aggregation schemes have been proposed to seamlessly integrate confidentiality and data aggregation. However, these schemes do not provide data integrity or allow hierarchical data aggregation if more than one encryption key is used in the network. This paper presents a novel integrity protecting hierarchical concealed data aggregation protocol that allows the aggregation of data packets that are encrypted with different encryption keys. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. The proposed data aggregation scheme employs an elliptic curve cryptography-based homomorphic encryption algorithm to offer data integrity and confidentiality along with hierarchical data aggregation. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1735 / 1746
页数:12
相关论文
共 50 条
  • [1] RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
    Chen, Chien-Ming
    Lin, Yue-Hsun
    Lin, Ya-Ching
    Sun, Hung-Min
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) : 727 - 734
  • [2] An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks
    Yang, L. J.
    Ding, C.
    Wu, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 136 - 138
  • [3] A Novel Efficient Approach for Protecting Integrity of Data Aggregation in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 1193 - 1198
  • [4] Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks
    Zhao, Xiaomin
    Zhu, Jiabin
    Liang, Xueli
    Jiang, Shuangshuang
    Chen, Qingzhang
    IET INFORMATION SECURITY, 2017, 11 (02) : 82 - 88
  • [5] iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks
    He, Wenbo
    Nguyen, Hoang
    Liu, Xue
    Nahrstedt, Klara
    Abdelzaher, Tarek
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 4071 - +
  • [6] Efficient concealed data aggregation with verification in wireless sensor networks
    Rafik, Merad Boudia Omar
    Mohammed, Feham
    2014 INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING DISTRIBUTED SYSTEMS AND APPLICATIONS (INDS 2014), 2014, : 76 - 81
  • [7] Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Keyur Parmar
    Devesh C. Jinwala
    Wireless Personal Communications, 2016, 87 : 971 - 993
  • [8] Concealed data aggregation in wireless sensor networks: A comprehensive survey
    Parmar, Keyur
    Jinwala, Devesh C.
    COMPUTER NETWORKS, 2016, 103 : 207 - 227
  • [9] Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Parmar, Keyur
    Jinwala, Devesh C.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) : 971 - 993
  • [10] Intrusion Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Radhakrishnan, Maivizhi
    Palanichamy, Yogesh
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 227 - 234