Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

被引:103
|
作者
Ozdemir, Suat [1 ]
Xiao, Yang [2 ]
机构
[1] Gazi Univ, Dept Comp Engn, TR-06570 Ankara, Turkey
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
基金
美国国家科学基金会;
关键词
Data integrity; Data confidentiality; Concealed data aggregation; Wireless sensor networks;
D O I
10.1016/j.comnet.2011.01.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, performing data aggregation while preserving data confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure data aggregation schemes have been proposed to seamlessly integrate confidentiality and data aggregation. However, these schemes do not provide data integrity or allow hierarchical data aggregation if more than one encryption key is used in the network. This paper presents a novel integrity protecting hierarchical concealed data aggregation protocol that allows the aggregation of data packets that are encrypted with different encryption keys. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. The proposed data aggregation scheme employs an elliptic curve cryptography-based homomorphic encryption algorithm to offer data integrity and confidentiality along with hierarchical data aggregation. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1735 / 1746
页数:12
相关论文
共 50 条
  • [21] Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation
    Yang, Wenbo
    Zhu, Wen Tao
    UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 252 - 266
  • [22] An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks
    Zhu, Liehuang
    Yang, Zhen
    Li, Meng
    Liu, Dan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [23] PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks
    Kumar, Vimal
    Madria, Sanjay
    2013 IEEE 32ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2013), 2013, : 10 - 19
  • [24] Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
    Jariwala, Vivaksha
    Patel, Himanshu
    Patel, Parth
    Jinwala, Devesh C.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2014, 5 (03) : 77 - 99
  • [25] Protecting Data Integrity for Multi-Application Environment in Wireless Sensor Networks
    Elmandi, Elbasher
    Yoo, Seong-Moo
    Sharshembiev, Kumar
    Kim, Yong-Kab
    Jeong, Geun-Ho
    2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 90 - 95
  • [26] Hierarchical and fault-tolerant data aggregation in wireless sensor networks
    Larrea, Mikel
    Martin, Cristian
    Astrain, Jose Javier
    2007 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1 AND 2, 2007, : 531 - +
  • [27] Symmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks using Privacy Homomorphism: A Review
    Jose, Josna
    Jose, Joyce
    Ilyas, Muhammed H.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE (ICIS), 2016, : 275 - 280
  • [28] Data Aggregation in Wireless Sensor Networks
    Li, Luo
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 28 - 33
  • [29] Data Aggregation in Wireless Sensor Networks
    Massad, Y. E.
    Goyeneche, M.
    Astrain, J. J.
    Villadangos, J.
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1937 - +
  • [30] Data Aggregation in Wireless Sensor Networks
    Sahana, S.
    Amutha, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,