Abstract
The communication paradigm in the Wireless Sensor Networks (WSNs) relies on in network processing i.e. on-the-fly pre-processing of the data sensed by the sensors, on its way to the base station. However, the fallout of in-network processing is that the multihop communication used in WSNs has to be data-centric, unlike the route-centric communication used in conventional networks. This requires that the intermediate nodes have access to the data that jeopardizes the stringent end-to-end security requirements of typical security-critical applications. An approach that promises the combination of end-to-end security and in-network aggregation is Concealed Data Aggregation. In this paper, we discuss our attempts at investigating the feasibility of applying the provably secure homomorphic encryption schemes to the WSNs, within the constraints permissible and without sacrificing any security. Based on our empirical evaluation centered around defined performance metrics, we demonstrate that it is feasible to employ the proposed approach for WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2229–2230 (2008)
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53(12), 2022–2037 (2009)
Rajagopalan, R., Varshney, P.K.: Data aggregation techniques in sensor networks: a survey. IEEE Communications Surveys & Tutorials 8(4), 48–63 (2006)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. Second ACM Conference on Embedded Networked Sensor Systems, pp. 162–175 (November 2004)
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proc. Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117 (2005)
Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for wireless sensor networks. In: Proc. Fourth IEEE Consumer Communications and Networking Conference, pp. 192–196 (2007)
Fontaine, C., Galand, F.: A survey of Homomorphic encryption for Nonspecialists. EURASIP Journal on Information Security, articleno-15, 15:1–15:15 (2007)
Guangli, X., Xinmeng, C., Ping, Z., Jie, M.: A method of Homomorphic encryption. Wuhan University Journal of Natural Sciences 11(1), 181–184 (2006)
Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wireless Communications 14(2), 70–87 (2007)
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–177. Academic Press (1978)
Alzaid, H., Foo, E., Nieto, J.G.: Secure data aggregation in wireless sensor network: a survey. In: Proc. of the Sixth Australasian Conference on Information Security (AISC 2008), vol. 81, pp. 93–105 (2008)
Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Information Security Conference, pp. 471–483 (2002)
Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)
Sander, T., Tschudin, C.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111–123. Springer, Heidelberg (1998)
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Sander, T., Tschudin, C.: Towards mobile cryptography. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 215–224. IEEE computer society press (1998)
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. SIGPLAN Not. 35(11), 93–104 (2000)
Levis, P., Lee, N.: TOSSIM: A Simulator for TinyOS Networks (September 17, 2003), http://today.cs.berkeley.edu/tos/tinyos-1.x/doc/nido.pdf
Titzer, B.L., Lee, D., Palsberg, J.: Avrora: Scalable sensor network simulation with precise timing. In: Proc. 4th International Symposium on Information Processing In Sensor Networks (IPSN), articleno-67 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Patel, B., Jinwala, D. (2011). Exploring Homomorphic Encryption in Wireless Sensor Networks. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)