Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks

被引:45
|
作者
Cui, Jie [1 ]
Shao, Lili [1 ]
Zhong, Hong [1 ]
Xu, Yan [1 ]
Liu, Lu [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Univ Derby, Dept Elect Comp & Math, Derby DE22 1GB, England
基金
中国国家自然科学基金;
关键词
Data aggregation; Confidentiality; Integrity; Homomorphic encryption; Large-scale wireless sensor networks; CONCEALED DATA AGGREGATION; SCHEME;
D O I
10.1007/s12083-017-0581-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.
引用
收藏
页码:1022 / 1037
页数:16
相关论文
共 50 条
  • [21] On the Construction of Data Aggregation Tree With Maximizing Lifetime in Large-Scale Wireless Sensor Networks
    Wan, Shaohua
    Zhang, Yudong
    Chen, Jia
    IEEE SENSORS JOURNAL, 2016, 16 (20) : 7433 - 7440
  • [22] Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
    Li, Xing
    Chen, Dexin
    Li, Chunyan
    Wang, Liangmin
    SENSORS, 2015, 15 (07): : 15952 - 15973
  • [23] End-to-End User Identity Confidentiality for UMTS Networks
    Choudhury, Hiten
    Roychoudhury, Basav
    Saikia, Dilip K.
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 46 - 50
  • [24] A large-scale dataset for end-to-end table recognition in the wild
    Fan Yang
    Lei Hu
    Xinwu Liu
    Shuangping Huang
    Zhenghui Gu
    Scientific Data, 10
  • [25] An end-to-end workflow pipeline for large-scale Grid computing
    McGough A.S.
    Cohen J.
    Darlington J.
    Katsiri E.
    Lee W.
    Panagiotidi S.
    Patel Y.
    Journal of Grid Computing, 2005, 3 (3-4) : 259 - 281
  • [26] SCALING END-TO-END MODELS FOR LARGE-SCALE MULTILINGUAL ASR
    Li, Bo
    Pang, Ruoming
    Sainath, Tara N.
    Gulati, Anmol
    Zhang, Yu
    Qin, James
    Haghani, Parisa
    Huang, W. Ronny
    Ma, Min
    Bai, Junwen
    2021 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU), 2021, : 1011 - 1018
  • [27] A large-scale dataset for end-to-end table recognition in the wild
    Yang, Fan
    Hu, Lei
    Liu, Xinwu
    Huang, Shuangping
    Gu, Zhenghui
    SCIENTIFIC DATA, 2023, 10 (01)
  • [28] Learning an End-to-End Structure for Retrieval in Large-Scale Recommendations
    Gao, Weihao
    Fan, Xiangjun
    Wang, Chong
    Sun, Jiankai
    Jia, Kai
    Xiao, Wenzhi
    Ding, Ruofan
    Bin, Xingyan
    Yang, Hui
    Liu, Xiaobing
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 524 - 533
  • [29] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) : 585 - 598
  • [30] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2584 - 2595