scispace - formally typeset
Book ChapterDOI

Secure data aggregation with multiple encryption

Melek Önen, +1 more
- pp 117-132
Reads0
Chats0
TLDR
A secure data aggregation scheme that ensures that sensors participating to the aggregation mechanism do not have access to the content of the data while adding their sensed values thanks to the use of an efficient homomorphic encryption scheme is proposed.
Abstract
Data aggregation has been put forward as an essential technique to achieve power efficiency in sensor networks. Data aggregation consists of processing data collected by source nodes at each intermediate node enroute to the sink in order to reduce redundancy and minimize bandwidth usage. The deployment of sensor networks in hostile environments call for security measures such as data encryption and authentication to prevent data tampering by intruders or disclosure by compromised nodes. Aggregation of encrypted and/or integrity-protected data by intermediate nodes that are not necessarily trusted due to potential node compromise is a challenging problem. We propose a secure data aggregation scheme that ensures that sensors participating to the aggregation mechanism do not have access to the content of the data while adding their sensed values thanks to the use of an efficient homomorphic encryption scheme. We provide a layered secure aggregation mechanism and the related key attribution algorithm that limits the impact of security threats such as node compromises. We also evaluate the robustness of the scheme against node failures and show that such failures are efficiently recovered by a small subset of nodes that are at most m hops away from the failure.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey on the Encryption of Convergecast Traffic with In-Network Processing

TL;DR: In this paper, an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes is presented, and a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.
Book ChapterDOI

Privacy-Preserving Content-Based Publish/Subscribe Networks

TL;DR: This work suggests a solution based on a commutative multiple encryption scheme in order to allow brokers to operate in-network matching and content based routing without having access to the content of the packets.
Proceedings ArticleDOI

Secure outsourced aggregation via one-way chains

TL;DR: SECOA is presented, a framework with a family of novel and optimally-secure protocols for secure outsourced aggregation, based on a unified use of one-way chains that supports a large and diverse set of aggregate functions.
Book ChapterDOI

Tightly-Secure Signatures from Chameleon Hash Functions

TL;DR: This work shows that any Chameleon Hash function can be transformed into a (binary) tree-based signature scheme with tight security and obtains the first tightly secure signature scheme from the SIS assumption and several schemes based on Diffie-Hellman in the standard model.
Proceedings ArticleDOI

A secure and resilient WSN roadside architecture for intelligent transport systems

TL;DR: This work provides a purely software based security solution which does not rely on costly HW components like road side units (RSU) or tamper resistant modules on sensor nodes.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Proceedings ArticleDOI

A concrete security treatment of symmetric encryption

TL;DR: This work studies notions and schemes for symmetric (ie. private key) encryption in a concrete security framework and gives four different notions of security against chosen plaintext attack, providing both upper and lower bounds, and obtaining tight relations.