Abstract
The distributed nature of Wireless Sensor Networks leads to the use of cloud databases that need to be protected when dealing with sensitive content. In this context, Searchable Symmetric Encryption provides the appropriate framework to perform secure searches. This work proposes a combination of secure indexes with Bloom Filters to efficiently address searches in encrypted content. We evaluate the performance of two different strategies to populate Bloom Filters in XM1000, Z1 and TelosB wireless sensor devices: (1) we first consider four cryptographic hash functions using the double hashing technique and truncating message digests; (2) we then select five symmetric encryption algorithms and two fast hash functions also with double hashing. We conclude that the best strategy for securing indexes is AES plus a fast FNV hash function and double hashing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Appleby, A.: murmurhash3 (2011)
Bogdanov, A.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_31
Cazorla, M., Gourgeon, S., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. Secur. Commun. Netw. 8(18), 3564–3579 (2015). http://dx.doi.org/10.1002/sec.1281
Eu-Jin, G.: Secure indexes. Technical report (2004). http://crypto.stanford.edu/eujin/papers/secureindex/
FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, US Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
FIPS PUB 185, Escrowed Encryption Standard (EES). Federal Information Processing Standards Publication 185 (1994)
Fowler, G.: Fowler/Noll/Vo (FNV) hash (1991). http://isthe.com/chongo/tech/comp/fnv
Fowler, G., Noll, L.C., Eastlake, D.: The FNV non-cryptographic hash algorithm. Internet Draft (2015)
Kirsch, A., Mitzenmacher, M.: Less hashing, same performance: building a better bloom filter. In: Azar, Y., Erlebach, T. (eds.) ESA 2006. LNCS, vol. 4168, pp. 456–467. Springer, Heidelberg (2006)
Li, J., Chen, X., Xhafa, F., Barolli, L.: Secure deduplication storage systems with keyword search. In: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 971–977, May 2014
Li, T., Wu, Y., Zhu, H.: An efficient scheme for encrypted data aggregation on sensor networks. In: IEEE 63rd Vehicular Technology Conference, 2006. VTC 2006-Spring, vol. 2, pp. 831–835, May 2006
Ohta, H., Matsui, M.: A description of the MISTY1 encryption algorithm. RFC 2994, November 2000
Pub, N.: Draft FIPS pub 202: SHA-3 standard: permutation-based hash and extendable-output functions. Federal Information Processing Standards Publication (2014)
Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Secure anonymous database search. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 115–126. ACM (2009)
Rivest, R.: The MD5 message-digest algorithm. Internet Request For Comments 1321 (1992)
Standard, N.S.H.: Federal information processing standards publication fipps 180–4 (2012)
Suga, T., Nishide, T., Sakurai, K.: Secure keyword search using bloom filter with specified character positions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 235–252. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33272-2_15
Tarkoma, S., Rothenberg, C., Lagerspetz, E.: Theory and practice of bloom filters for distributed systems. Commun. Surv. Tutor. IEEE 14(1), 131–155 (2012). First
Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, 27 April–2 May 2014, pp. 2112–2120 (2014). http://dx.doi.org/10.1109/INFOCOM.2014.6848153
Wang, C., Ren, K., Yu, S., Urs, K.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE INFOCOM, 2012, pp. 451–459, March 2012
Wheeler, D., Needham, R.: Tea extensions, also correction to XTEA, October 1998. www.ftp.cl.cam.ac.uk/ftp/users/djw3
Wu, Y., Ma, D., Li, T., Deng, R.: Classify encrypted data in wireless sensor networks. In: IEEE 60th Vehicular Technology Conference, VTC-Fall, vol. 5, pp. 3236–3239, September 2004
Acknowledgment
This work has been financially supported by the Swiss Hasler Foundation in the framework of the POPWiN project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Muñoz, C., Rocci, L., Solana, E., Leone, P. (2016). Performance Evaluation of Searchable Symmetric Encryption in Wireless Sensor Networks. In: Mandler, B., et al. Internet of Things. IoT Infrastructures. IoT360 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 169. Springer, Cham. https://doi.org/10.1007/978-3-319-47063-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-47063-4_4
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47062-7
Online ISBN: 978-3-319-47063-4
eBook Packages: Computer ScienceComputer Science (R0)