Energy Efficient Recoverable Concealed Data Aggregation in Wireless Sensor Networks

被引:0
|
作者
Jose, Josna [1 ]
Kumar, Manoj S. [1 ]
Jose, Joyce [1 ]
机构
[1] Karunya Univ, Dept Informat Technol, Coimbatore, Tamil Nadu, India
关键词
Wireless Sensor Networks; Data Aggregation; Secure data aggregation; Concealed data aggregation; End to end encrypted data aggregation; Privacy homomorphism; Asymmetric PH; Symmetric PH; End to end confidentiality; Data integrity; Data authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Concealed data aggregation (CDA) is important in wireless sensor networks, because it provides an energy efficient secure communication by allowing in network data aggregation on encrypted data. Privacy homomorphism (PH) based algorithms are the basis of CDA. However, it supports only a limited number of aggregation functions. Recoverability of individual sensor readings from the concealed data aggregation result at the BS overcomes the limitation of PH based algorithms on aggregation function. Thus, it allows authentication and integrity checking. But this technique reduces the node energy due to the computation overhead of encryption, signature operation as well as the transfer of both. So a mechanism that saves the energy of sensor nodes is required. The proposed technique overcomes this by transmitting the difference data rather than raw data from sensor node to cluster head. This differential data transfer achieves more energy and bandwidth efficiency than the existing recoverable concealed data aggregation scheme. The proposed differential data based recoverable data aggregation scheme increases the network lifetime by avoiding the redundant data transfer from each sensor node. Thus, it reduces the transmission overhead in the secure communication.
引用
下载
收藏
页码:322 / 329
页数:8
相关论文
共 50 条
  • [1] RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
    Chen, Chien-Ming
    Lin, Yue-Hsun
    Lin, Ya-Ching
    Sun, Hung-Min
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) : 727 - 734
  • [2] Efficient concealed data aggregation with verification in wireless sensor networks
    Rafik, Merad Boudia Omar
    Mohammed, Feham
    2014 INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING DISTRIBUTED SYSTEMS AND APPLICATIONS (INDS 2014), 2014, : 76 - 81
  • [3] An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
    Sun, Hung-Min
    Lin, Yue-Hsun
    Hsiao, Ying-Chu
    Chen, Chien-Ming
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, : 19 - 26
  • [4] ENERGY EFFICIENT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    Padmaja, P.
    Marutheswar, G. V.
    MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 388 - 396
  • [5] An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks
    Zhong, Hong
    Shao, Lili
    Cui, Jie
    Xu, Yan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 1 - 12
  • [6] Detection of packet - dropping attack in recoverable concealed data aggregation protocol for homogeneous wireless sensor networks
    Kaur, Amandeep
    Sran, Sukhwinder Singh
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 666 - 670
  • [7] Energy Efficient Data Aggregation and Routing in Wireless Sensor Networks
    Sutagundar, A. V.
    Manvi, S. S.
    Halakarnimath, B. S.
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 254 - +
  • [8] Energy efficient correlated data aggregation for wireless sensor networks
    Park, Seung-Jong
    Sivakumar, Raghupathy
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2008, 4 (01): : 13 - 27
  • [9] Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks
    Zheng, Jin
    Xu, Xinlin
    Wang, Guojun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1662 - 1667
  • [10] Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Keyur Parmar
    Devesh C. Jinwala
    Wireless Personal Communications, 2016, 87 : 971 - 993