Homomorphic Cryptoschemes based Secure Data Aggregation for Wireless Sensor Networks

무선 센서 네트워크를 위한 준동형 암호체계 기반의 안전한 데이터 병합 기법

  • Published : 2009.04.15

Abstract

Data aggregation is one of the well-known techniques to reduce the energy consumption for information transmission over wireless sensor networks (WSN). As the WSNs are deployed in untrusted or even hostile environments, the data aggregation becomes problematic when end-to-end data privacy including data confidentiality and integrity between sensor nodes and base station, is required. Meanwhile, data homomorphic cryptoschemes have been investigated recently and recommended to provide the end-to-end privacy in the hostile environments. In order to assure both data confidentiality and integrity for data aggregation, this paper analyzes the existing homomorphic cryptoschemes and digital signature schemes, proposes possible combinations, and evaluates their performance in terms of CPU overheads and communication costs.

데이터 병합은 무선 센서 네트워크 상에서 정보 전송시 소요되는 에너지를 줄이기 위해 잘 알려진 기법 중에 하나이다. 무선 센서 네트워크가 신뢰할 수 없고, 심지어 위험 환경에 노출되고 있으나, 기존 데이터 병합 기법은 센서 노드와 베이스 스테이션 종단간 데이터 프라이버시(데이터 기밀성 및 무결성)를 제공하지 못하는 문제점을 갖고 있다. 최근 들어 연구되고 있는 데이터 동상 암호체계 기법이 상기 위험 환경에서 종단간 프라이버시를 제공하기 위한 한 방법이 될 수 있다. 본 논문에서는 데이터 병합시 데이터 기밀성과 무결성을 보장하기 위하여 기존 동상 암호체계 기법 및 타기법 분석을 통하여 가능한 조합을 제시하고 CPU 부하 및 통신비용 측면에서 그 성능을 평가한다.

Keywords

References

  1. Piotrowski, K, Langendoerfer, P., Peter, S., "How public key cryptography influences wireless sensor node lifetime," Proc. of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169-176, 2006
  2. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K, "System Architecture Directions for Networked Sensors," ACM SIGPLAN Notices, Vol.35, Issue 11, pp. 93-104, 2000 https://doi.org/10.1145/356989.356998
  3. Girao, J., Westhoff, D., Schneider, M., "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. of IEEE International Conference on Communications (ICC 2005), Vol.5, pp. 3044-3049, 2005 https://doi.org/10.1109/ICC.2005.1494953
  4. Mykletun, E., Girao, J., Westhoff, D., "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. of IEEE International Conference on Communications (ICC '06), Vol.5, pp. 2288-2295, 2006
  5. Hu, L., Evans, D., "Secure Aggregation for Wireless Networks," Proc. of the 2003 Symposium on Applications and the Internet Workshops, pp. 384-391, 2003
  6. Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N., "Secure Data Aggregation in Wireless Sensor Networks: A survey," Proc. of the 7th Int. Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp. 315-320, 2006
  7. Castelluccia, C., Mykletun, E., Tsudik, G., "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitos 2005), pp. 109-117, 2005
  8. Peter, S., Piotrowski, K, Langendoerfer, P., "On Concealed Data Aggregation for Wireless Sensor Networks," Proc. of IEEE Consumer Communications and Networking Conference (IEEE CCNC 2007), pp. 192-196, 2007
  9. Domingo-Ferrer, J, "A provably Secure Additive and Multiplicative Privacy Homomorphism," Proc. of the 5th International Conference on Information Security, LNCS Vol.2433, pp. 471-483, 2002 https://doi.org/10.1007/3-540-45811-5_37
  10. Wagner, D., "Cryptanalysis on the Algebraic Privacy Homomorphism," Proc. of the 6th International Conference on Information Security (ISC 2003), LNCS VoI.2851, pp. 234-239, 2003 https://doi.org/10.1007/10958513_18
  11. Peter, S., Langendorfer, P., Piotrowski, K, "Public Key Cryptography Empowered Smart Dust is Affordable," Int. Journal of Sensor Networks 2008, Vol.4, No. 1/2, pp. 130-143, 2008 https://doi.org/10.1504/IJSNET.2008.019258
  12. Przydatek, B., Song, D., Perrig, A., "SIA: Secure Information Aggregation in Sensor Networks," Proc. of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255-265, 2003
  13. Boneh, D., Gentry, C., Lynn, B., and Shacham, H., "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. of EUROCRYPT '2003, LNSC VoI.2656, pp. 416-432, 2003 https://doi.org/10.1007/3-540-39200-9_26
  14. Mykletun, E., Narasimha, M., and Tsudik, G., "Authentication and Integrity in Outsourced Databases," the 11th Annual Network and Distributed System Security Symposium, USA, 2006