Journal ArticleDOI
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
TLDR
This article proposes a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data and constructs an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive.Abstract:
Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity) is required. In this article, we propose a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data. Only one modular addition is necessary for ciphertext aggregation. The security of the scheme is based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. We show that aggregation based on this scheme can be used to efficiently compute statistical values, such as mean, variance, and standard deviation of sensed data, while achieving significant bandwidth savings. To protect the integrity of the aggregated data, we construct an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, also based on the indistinguishability property of PRFs.read more
Citations
More filters
Journal ArticleDOI
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
TL;DR: This paper proposes an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications that resists various security threats and preserve user privacy, and has significantly less computation and communication overhead than existing competing approaches.
Patent
Privacy-preserving aggregation of Time-series data
TL;DR: In this paper, a private stream aggregation (PSA) system is proposed to contribute a user's data to a data aggregator without compromising the user's privacy, where the aggregator can decrypt an aggregate value without decrypting individual data values associated with the set of users, and without interacting with the users while decrypting the aggregate value.
Journal ArticleDOI
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
TL;DR: The proposed Lightweight Privacy-preserving data aggregation scheme, called LPDA, is characterized by employing the homomorphic Paillier encryption, Chinese Remainder Theorem, and one-way hash chain techniques to not only aggregate hybrid IoT devices’ data into one, but also early filter injected false data at the network edge.
Journal ArticleDOI
Security in wireless sensor networks
Xiaojiang Du,Hsiao-Hwa Chen +1 more
TL;DR: The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.
Journal ArticleDOI
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
TL;DR: Various types of attacks and countermeasures related to trust schemes in WSNs are categorized, the development of trust mechanisms are provided, a short summarization of classical trust methodologies are given and an open field and future direction with trust mechanisms in W SNs is provided.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings ArticleDOI
A key-management scheme for distributed sensor networks
TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
TL;DR: This work presents the Tiny AGgregation (TAG) service for aggregation in low-power, distributed, wireless environments, and discusses a variety of optimizations for improving the performance and fault tolerance of the basic solution.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Journal ArticleDOI
Secure routing in wireless sensor networks: attacks and countermeasures
Chris Karlof,David Wagner +1 more
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.