Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

被引:103
|
作者
Ozdemir, Suat [1 ]
Xiao, Yang [2 ]
机构
[1] Gazi Univ, Dept Comp Engn, TR-06570 Ankara, Turkey
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
基金
美国国家科学基金会;
关键词
Data integrity; Data confidentiality; Concealed data aggregation; Wireless sensor networks;
D O I
10.1016/j.comnet.2011.01.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, performing data aggregation while preserving data confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure data aggregation schemes have been proposed to seamlessly integrate confidentiality and data aggregation. However, these schemes do not provide data integrity or allow hierarchical data aggregation if more than one encryption key is used in the network. This paper presents a novel integrity protecting hierarchical concealed data aggregation protocol that allows the aggregation of data packets that are encrypted with different encryption keys. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. The proposed data aggregation scheme employs an elliptic curve cryptography-based homomorphic encryption algorithm to offer data integrity and confidentiality along with hierarchical data aggregation. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1735 / 1746
页数:12
相关论文
共 50 条
  • [41] Detection of packet - dropping attack in recoverable concealed data aggregation protocol for homogeneous wireless sensor networks
    Kaur, Amandeep
    Sran, Sukhwinder Singh
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 666 - 670
  • [42] A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
    Efat Yousefpoor
    Hamid Barati
    Ali Barati
    Peer-to-Peer Networking and Applications, 2021, 14 : 1917 - 1942
  • [43] A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
    Yousefpoor, Efat
    Barati, Hamid
    Barati, Ali
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 1917 - 1942
  • [44] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [45] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [46] Efficient Data Aggregation in Wireless Sensor Networks
    Anisi, Mohammad Hossein
    Abdullah, Abdul Hanan
    Razak, Shukor Abd
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 305 - 310
  • [47] An Analysis on Data Aggregation in Wireless Sensor Networks
    Renjith, P. N.
    Baburaj, E.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 62 - 71
  • [48] Secured data aggregation in wireless sensor networks
    Sathya, D.
    Kumar, Ganesh P.
    SENSOR REVIEW, 2018, 38 (03) : 369 - 375
  • [49] A data aggregation scheme for wireless sensor networks
    Department of Computer Science and Engineering, Beijing Institute of Technology, Beijing 100081, China
    不详
    Jisuanji Gongcheng, 2006, 6 (115-117):
  • [50] LPT for data aggregation in wireless sensor networks
    Lee, M
    Wong, VWS
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 2969 - 2974