Skip to main content

Performance Evaluation of Searchable Symmetric Encryption in Wireless Sensor Networks

  • Conference paper
Internet of Things. IoT Infrastructures (IoT360 2015)

Abstract

The distributed nature of Wireless Sensor Networks leads to the use of cloud databases that need to be protected when dealing with sensitive content. In this context, Searchable Symmetric Encryption provides the appropriate framework to perform secure searches. This work proposes a combination of secure indexes with Bloom Filters to efficiently address searches in encrypted content. We evaluate the performance of two different strategies to populate Bloom Filters in XM1000, Z1 and TelosB wireless sensor devices: (1) we first consider four cryptographic hash functions using the double hashing technique and truncating message digests; (2) we then select five symmetric encryption algorithms and two fast hash functions also with double hashing. We conclude that the best strategy for securing indexes is AES plus a fast FNV hash function and double hashing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Appleby, A.: murmurhash3 (2011)

    Google Scholar 

  2. Bogdanov, A.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_31

    Chapter  Google Scholar 

  3. Cazorla, M., Gourgeon, S., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. Secur. Commun. Netw. 8(18), 3564–3579 (2015). http://dx.doi.org/10.1002/sec.1281

  4. Eu-Jin, G.: Secure indexes. Technical report (2004). http://crypto.stanford.edu/eujin/papers/secureindex/

  5. FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, US Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  6. FIPS PUB 185, Escrowed Encryption Standard (EES). Federal Information Processing Standards Publication 185 (1994)

    Google Scholar 

  7. Fowler, G.: Fowler/Noll/Vo (FNV) hash (1991). http://isthe.com/chongo/tech/comp/fnv

  8. Fowler, G., Noll, L.C., Eastlake, D.: The FNV non-cryptographic hash algorithm. Internet Draft (2015)

    Google Scholar 

  9. Kirsch, A., Mitzenmacher, M.: Less hashing, same performance: building a better bloom filter. In: Azar, Y., Erlebach, T. (eds.) ESA 2006. LNCS, vol. 4168, pp. 456–467. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Li, J., Chen, X., Xhafa, F., Barolli, L.: Secure deduplication storage systems with keyword search. In: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 971–977, May 2014

    Google Scholar 

  11. Li, T., Wu, Y., Zhu, H.: An efficient scheme for encrypted data aggregation on sensor networks. In: IEEE 63rd Vehicular Technology Conference, 2006. VTC 2006-Spring, vol. 2, pp. 831–835, May 2006

    Google Scholar 

  12. Ohta, H., Matsui, M.: A description of the MISTY1 encryption algorithm. RFC 2994, November 2000

    Google Scholar 

  13. Pub, N.: Draft FIPS pub 202: SHA-3 standard: permutation-based hash and extendable-output functions. Federal Information Processing Standards Publication (2014)

    Google Scholar 

  14. Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Secure anonymous database search. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 115–126. ACM (2009)

    Google Scholar 

  15. Rivest, R.: The MD5 message-digest algorithm. Internet Request For Comments 1321 (1992)

    Google Scholar 

  16. Standard, N.S.H.: Federal information processing standards publication fipps 180–4 (2012)

    Google Scholar 

  17. Suga, T., Nishide, T., Sakurai, K.: Secure keyword search using bloom filter with specified character positions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 235–252. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33272-2_15

    Chapter  Google Scholar 

  18. Tarkoma, S., Rothenberg, C., Lagerspetz, E.: Theory and practice of bloom filters for distributed systems. Commun. Surv. Tutor. IEEE 14(1), 131–155 (2012). First

    Article  Google Scholar 

  19. Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, 27 April–2 May 2014, pp. 2112–2120 (2014). http://dx.doi.org/10.1109/INFOCOM.2014.6848153

  20. Wang, C., Ren, K., Yu, S., Urs, K.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE INFOCOM, 2012, pp. 451–459, March 2012

    Google Scholar 

  21. Wheeler, D., Needham, R.: Tea extensions, also correction to XTEA, October 1998. www.ftp.cl.cam.ac.uk/ftp/users/djw3

  22. Wu, Y., Ma, D., Li, T., Deng, R.: Classify encrypted data in wireless sensor networks. In: IEEE 60th Vehicular Technology Conference, VTC-Fall, vol. 5, pp. 3236–3239, September 2004

    Google Scholar 

Download references

Acknowledgment

This work has been financially supported by the Swiss Hasler Foundation in the framework of the POPWiN project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cristina Muñoz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Muñoz, C., Rocci, L., Solana, E., Leone, P. (2016). Performance Evaluation of Searchable Symmetric Encryption in Wireless Sensor Networks. In: Mandler, B., et al. Internet of Things. IoT Infrastructures. IoT360 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 169. Springer, Cham. https://doi.org/10.1007/978-3-319-47063-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47063-4_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47062-7

  • Online ISBN: 978-3-319-47063-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics