Skip to main content

A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2016)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9724))

Included in the following conference series:

  • 1142 Accesses

Abstract

Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs). However, in hostile environments, the aggregated data can be subject to several types of attacks, and provide security is necessary. Recently, several secure data aggregation schemes based on homomorphic encryption have been proposed for wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since the aggregator can directly aggregate the ciphertexts without decryption. Based on our survey of existing research for ensuring secure data aggregation in WSNs, an Efficient Secure data aggregation scheme based on fully Homomorphic Encryption (E-SHE), is proposed. This scheme can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), we can also verify data integrity during data aggregation and forwarding processes so that false data can be detected. Our experiments show that E-SHE requires less computation overheads and communication than previously methods and can effectively preserve data integrity, and precise data aggregation rate while consuming less energy to extend network lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Com. Mag. 40, 102–114 (2002)

    Article  Google Scholar 

  2. Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 5(3), 20:1–20:36 (2009)

    Google Scholar 

  3. Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. Wirel. Commun. 14(2), 70–87 (2007)

    Article  Google Scholar 

  4. Katz, J., Lindell, A.Y.: Aggregate message authentication codes. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 155–169. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. He, W., Nguyen, H., Liu, X., Nahrstedt, N., Abdelzaher, T.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Proceedings of IEEE Military Communications Conference (2008)

    Google Scholar 

  6. Ozdemir, S., Cam, H.: Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Trans. Netw. 18, 736–749 (2010)

    Article  Google Scholar 

  7. Ozdemir, S., Xiao, X.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011)

    Article  Google Scholar 

  8. Papadopoulos, S., Kiayias, A., Papadias, D.: Exact in-network aggregation with integrity and confidentiality. IEEE Trans. Knowl. Data Eng. 24(10), 1760–1773 (2012)

    Article  Google Scholar 

  9. Engouang, T.D., Yun, L.: Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks. In: Proceedings of the 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (2013)

    Google Scholar 

  10. Parmar, K., Jinwala, D.C.: Aggregate MAC based authentication for secure data aggregation in wireless sensor networks. In: Huang, D.-S., Jo, K.-H., Wang, L. (eds.) ICIC 2014. LNCS, vol. 8589, pp. 475–483. Springer, Heidelberg (2014)

    Google Scholar 

  11. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47, 53–57 (2004)

    Article  Google Scholar 

  12. Parmar, K., Jinwala, D.C.: Symmetric-key based homomorphic primitives for end-to-end secure data aggregation in wireless sensor networks. J. Inf. Secur. 6(1), 38–50 (2015)

    Article  Google Scholar 

  13. Shi, Y., He, Z.: A lightweight white-box symmetric encryption algorithm against node capture for WSNs. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC) (2014)

    Google Scholar 

  14. Zhou, Q., Yang, G., He, L.: An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. Int. J. Distrib. Sens. Netw. (2014)

    Google Scholar 

  15. Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire TinyOS applications. In: Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys) (2003)

    Google Scholar 

  16. Shnayder, V., Hempstead, M., Chen, B., Welsh, M.: PowerTOSSIM: efficient power simulation for TinyOS applications. In: Proceedings of ACM International Conference on Embedded Networked Sensor Systems (SenSys) (2004)

    Google Scholar 

  17. Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN) (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haythem Hayouni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Hayouni, H., Hamdi, M. (2016). A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks. In: Mitton, N., Loscri, V., Mouradian, A. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2016. Lecture Notes in Computer Science(), vol 9724. Springer, Cham. https://doi.org/10.1007/978-3-319-40509-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40509-4_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40508-7

  • Online ISBN: 978-3-319-40509-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics