Abstract
Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs). However, in hostile environments, the aggregated data can be subject to several types of attacks, and provide security is necessary. Recently, several secure data aggregation schemes based on homomorphic encryption have been proposed for wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since the aggregator can directly aggregate the ciphertexts without decryption. Based on our survey of existing research for ensuring secure data aggregation in WSNs, an Efficient Secure data aggregation scheme based on fully Homomorphic Encryption (E-SHE), is proposed. This scheme can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), we can also verify data integrity during data aggregation and forwarding processes so that false data can be detected. Our experiments show that E-SHE requires less computation overheads and communication than previously methods and can effectively preserve data integrity, and precise data aggregation rate while consuming less energy to extend network lifetime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Com. Mag. 40, 102–114 (2002)
Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 5(3), 20:1–20:36 (2009)
Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. Wirel. Commun. 14(2), 70–87 (2007)
Katz, J., Lindell, A.Y.: Aggregate message authentication codes. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 155–169. Springer, Heidelberg (2008)
He, W., Nguyen, H., Liu, X., Nahrstedt, N., Abdelzaher, T.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Proceedings of IEEE Military Communications Conference (2008)
Ozdemir, S., Cam, H.: Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Trans. Netw. 18, 736–749 (2010)
Ozdemir, S., Xiao, X.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011)
Papadopoulos, S., Kiayias, A., Papadias, D.: Exact in-network aggregation with integrity and confidentiality. IEEE Trans. Knowl. Data Eng. 24(10), 1760–1773 (2012)
Engouang, T.D., Yun, L.: Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks. In: Proceedings of the 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (2013)
Parmar, K., Jinwala, D.C.: Aggregate MAC based authentication for secure data aggregation in wireless sensor networks. In: Huang, D.-S., Jo, K.-H., Wang, L. (eds.) ICIC 2014. LNCS, vol. 8589, pp. 475–483. Springer, Heidelberg (2014)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47, 53–57 (2004)
Parmar, K., Jinwala, D.C.: Symmetric-key based homomorphic primitives for end-to-end secure data aggregation in wireless sensor networks. J. Inf. Secur. 6(1), 38–50 (2015)
Shi, Y., He, Z.: A lightweight white-box symmetric encryption algorithm against node capture for WSNs. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC) (2014)
Zhou, Q., Yang, G., He, L.: An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. Int. J. Distrib. Sens. Netw. (2014)
Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire TinyOS applications. In: Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys) (2003)
Shnayder, V., Hempstead, M., Chen, B., Welsh, M.: PowerTOSSIM: efficient power simulation for TinyOS applications. In: Proceedings of ACM International Conference on Embedded Networked Sensor Systems (SenSys) (2004)
Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN) (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Hayouni, H., Hamdi, M. (2016). A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks. In: Mitton, N., Loscri, V., Mouradian, A. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2016. Lecture Notes in Computer Science(), vol 9724. Springer, Cham. https://doi.org/10.1007/978-3-319-40509-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-40509-4_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40508-7
Online ISBN: 978-3-319-40509-4
eBook Packages: Computer ScienceComputer Science (R0)