Energy Efficient Recoverable Concealed Data Aggregation in Wireless Sensor Networks

被引:0
|
作者
Jose, Josna [1 ]
Kumar, Manoj S. [1 ]
Jose, Joyce [1 ]
机构
[1] Karunya Univ, Dept Informat Technol, Coimbatore, Tamil Nadu, India
关键词
Wireless Sensor Networks; Data Aggregation; Secure data aggregation; Concealed data aggregation; End to end encrypted data aggregation; Privacy homomorphism; Asymmetric PH; Symmetric PH; End to end confidentiality; Data integrity; Data authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Concealed data aggregation (CDA) is important in wireless sensor networks, because it provides an energy efficient secure communication by allowing in network data aggregation on encrypted data. Privacy homomorphism (PH) based algorithms are the basis of CDA. However, it supports only a limited number of aggregation functions. Recoverability of individual sensor readings from the concealed data aggregation result at the BS overcomes the limitation of PH based algorithms on aggregation function. Thus, it allows authentication and integrity checking. But this technique reduces the node energy due to the computation overhead of encryption, signature operation as well as the transfer of both. So a mechanism that saves the energy of sensor nodes is required. The proposed technique overcomes this by transmitting the difference data rather than raw data from sensor node to cluster head. This differential data transfer achieves more energy and bandwidth efficiency than the existing recoverable concealed data aggregation scheme. The proposed differential data based recoverable data aggregation scheme increases the network lifetime by avoiding the redundant data transfer from each sensor node. Thus, it reduces the transmission overhead in the secure communication.
引用
收藏
页码:322 / 329
页数:8
相关论文
共 50 条
  • [41] Learning automata based energy efficient data aggregation in wireless sensor networks
    M. Asemani
    M. Esnaashari
    Wireless Networks, 2015, 21 : 2035 - 2053
  • [42] An Efficient Data Aggregation Scheme in Wireless Sensor Networks
    Wang, Ying
    Li, Guorui
    INTERNET OF THINGS-BK, 2012, 312 : 25 - +
  • [43] Secure and Efficient Data Aggregation for Wireless Sensor Networks
    Wang, Xiaoyan
    Li, Jie
    Peng, Xiaoning
    Zou, Beiji
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [44] Efficient aggregation of encrypted data in wireless sensor networks
    Castelluccia, C
    Mykletun, E
    Tsudik, G
    PROCEEDINGS OF MOBIQUITOUS 2005, 2005, : 109 - 117
  • [45] Efficient data aggregation and transport in wireless sensor networks
    Diaz, Mario O.
    Leung, Kin K.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (08): : 1030 - 1041
  • [46] CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks
    Lin, Yue-Hsun
    Chang, Shih-Ying
    Sun, Hung-Min
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (07) : 1471 - 1483
  • [47] An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks
    Yang, L. J.
    Ding, C.
    Wu, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 136 - 138
  • [48] CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
    Girao, J
    Westhoff, D
    Schneider, M
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3044 - 3049
  • [49] An Efficient Recoverable Concealed Data Aggregation Scheme for Direct Load Control
    Sun, Zhongwei
    Song, Chuqi
    Gao, Rui
    Zhang, Ran
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018,
  • [50] AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARING
    Horng, Gwoboa
    Wang, Chien-Lung
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (10A): : 3085 - 3097