Skip to main content

An Efficient Data Aggregation Scheme for Protecting the Integrity of Sensitive Data in Wireless Sensor Networks

  • Conference paper
Ubiquitous Information Technologies and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 280))

Abstract

Since wireless sensor networks (WSNs) are resources-constrained, it is very essential to gather data efficiently. For this, data aggregation schemes are studied to minimize transmission cost in terms of the number of data packets. On the other hand, many applications want to preserve data privacy and integrity from the interception (or eavesdropping) of the data by an adversary. However, the existing schemes suffer from high communication cost. To resolve the problems, in this paper, we propose an efficient data aggregation scheme for protecting the integrity of sensitive data in WSNs. Our scheme makes use of the additive property of complex numbers to achieve sensitive data aggregation with protecting data integrity. With simulation results, we show that our scheme is much more efficient in terms of both communication overheads and integrity checking than the existing schemes for protecting integrity and privacy preserving data aggregation in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2292–2330 (2008)

    Article  Google Scholar 

  2. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 2045–2053 (May 2007)

    Google Scholar 

  3. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks. In: IEEE MILCOM, pp. 1–7 (November 2008)

    Google Scholar 

  4. Itanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: MobiCom (2002)

    Google Scholar 

  5. Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117 (2005)

    Google Scholar 

  6. Blaß, E.-O., Zitterbart, M.: An efficient key establishment scheme for secure aggregating sensor networks. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 303–310 (March 2006)

    Google Scholar 

  7. Levis, P., Lee, N., Welsh, M., Cullar, D.: TOSSIM: Accurate and scalable simulation of entire TinyOS applications, http://www.cs.berkely.edu/~pal/research/tossim.html

  8. Bista, R., Kim, Y.K., Chang, J.W.: A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks. In: CIT 2009, vol. 2, pp. 9–15 (2009)

    Google Scholar 

  9. He, W., Liu, X., Nguyen, H., Nahrstedt, K.: A Cluster-based Protocol To Enforce Integrity and Preserve Privacy in Data Aggregation. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 14–19 (2009)

    Google Scholar 

  10. Bista, R., Chang, J.W.: Energy Efficient Data Aggregation for Wireless Sensor Networks. Sustainable Wireless Sensor Networks (2010)

    Google Scholar 

  11. Zobel, J., Moffat, A., Ramamohanarao, K.: Inverted Files versus Signature File for Text Indexing. In: ACM TDS, vol. 23(4), pp. 453–490 (1998)

    Google Scholar 

  12. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D.E., Pister, K.S.J.: System Architecture Directions for Networked Sensors. In: ASPLOS 2002, pp. 93–104 (2002)

    Google Scholar 

  13. Rivest, R.L.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyunjo Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H., Kim, TH., Chang, JW. (2014). An Efficient Data Aggregation Scheme for Protecting the Integrity of Sensitive Data in Wireless Sensor Networks. In: Jeong, YS., Park, YH., Hsu, CH., Park, J. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 280. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41671-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41671-2_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41670-5

  • Online ISBN: 978-3-642-41671-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics