Browse > Article

Homomorphic Cryptoschemes based Secure Data Aggregation for Wireless Sensor Networks  

Yulia, Ponomarchuk (경북대학교 전자전기컴퓨터학부)
Nam, Young-Jin (대구대학교 컴퓨터IT학부)
Seo, Dae-Wha (경북대학교 전자전기컴퓨터학부)
Abstract
Data aggregation is one of the well-known techniques to reduce the energy consumption for information transmission over wireless sensor networks (WSN). As the WSNs are deployed in untrusted or even hostile environments, the data aggregation becomes problematic when end-to-end data privacy including data confidentiality and integrity between sensor nodes and base station, is required. Meanwhile, data homomorphic cryptoschemes have been investigated recently and recommended to provide the end-to-end privacy in the hostile environments. In order to assure both data confidentiality and integrity for data aggregation, this paper analyzes the existing homomorphic cryptoschemes and digital signature schemes, proposes possible combinations, and evaluates their performance in terms of CPU overheads and communication costs.
Keywords
wireless sensor networks; secure data aggregation; homomorphic cryptoschemes;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K, "System Architecture Directions for Networked Sensors," ACM SIGPLAN Notices, Vol.35, Issue 11, pp. 93-104, 2000   DOI
2 Hu, L., Evans, D., "Secure Aggregation for Wireless Networks," Proc. of the 2003 Symposium on Applications and the Internet Workshops, pp. 384-391, 2003
3 Wagner, D., "Cryptanalysis on the Algebraic Privacy Homomorphism," Proc. of the 6th International Conference on Information Security (ISC 2003), LNCS VoI.2851, pp. 234-239, 2003   DOI
4 Castelluccia, C., Mykletun, E., Tsudik, G., "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitos 2005), pp. 109-117, 2005
5 Girao, J., Westhoff, D., Schneider, M., "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. of IEEE International Conference on Communications (ICC 2005), Vol.5, pp. 3044-3049, 2005   DOI
6 Mykletun, E., Girao, J., Westhoff, D., "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. of IEEE International Conference on Communications (ICC '06), Vol.5, pp. 2288-2295, 2006
7 Domingo-Ferrer, J, "A provably Secure Additive and Multiplicative Privacy Homomorphism," Proc. of the 5th International Conference on Information Security, LNCS Vol.2433, pp. 471-483, 2002   DOI
8 Peter, S., Langendorfer, P., Piotrowski, K, "Public Key Cryptography Empowered Smart Dust is Affordable," Int. Journal of Sensor Networks 2008, Vol.4, No. 1/2, pp. 130-143, 2008   DOI   ScienceOn
9 Piotrowski, K, Langendoerfer, P., Peter, S., "How public key cryptography influences wireless sensor node lifetime," Proc. of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169-176, 2006
10 Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N., "Secure Data Aggregation in Wireless Sensor Networks: A survey," Proc. of the 7th Int. Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp. 315-320, 2006
11 Boneh, D., Gentry, C., Lynn, B., and Shacham, H., "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. of EUROCRYPT '2003, LNSC VoI.2656, pp. 416-432, 2003   DOI
12 Peter, S., Piotrowski, K, Langendoerfer, P., "On Concealed Data Aggregation for Wireless Sensor Networks," Proc. of IEEE Consumer Communications and Networking Conference (IEEE CCNC 2007), pp. 192-196, 2007
13 Przydatek, B., Song, D., Perrig, A., "SIA: Secure Information Aggregation in Sensor Networks," Proc. of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255-265, 2003
14 Mykletun, E., Narasimha, M., and Tsudik, G., "Authentication and Integrity in Outsourced Databases," the 11th Annual Network and Distributed System Security Symposium, USA, 2006