Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption

Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data confidentiality and integrity is mounting a challenge. The existing solutions either have large communication and computation overheads or produce inaccurate results. This paper proposes a novel secure data aggregation scheme based on homomorphic encryption in WSNs. The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic signature to check the aggregation data integrity. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. Simulation results and performance analysis show that our mechanism requires less communication and computation overheads than previously known methods. It can effectively preserve data privacy, check data integrity, and achieve high data transmission efficiency. Also, it performs accurate data aggregation rate while consuming less energy to prolong network lifetime.

[1]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[2]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[3]  Takahiro Hara,et al.  Wireless Sensor Network Technologies for the Information Explosion Era , 2012, Wireless Sensor Network Technologies for the Information Explosion Era.

[4]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[5]  Haifeng Yu,et al.  Secure and highly-available aggregation queries in large-scale sensor networks via set sampling , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[6]  Nitin Gupta,et al.  Wireless Sensor Network: A Review on Data Aggregation , 2011 .

[7]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[8]  Tatsuaki Okamoto,et al.  EPOC: Efficient Probabilistic Public-Key Encryption (Submission to P1363a) , 1998 .

[9]  Tatsuaki Okamoto,et al.  A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.

[10]  Josep Domingo-Ferrer,et al.  A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.

[11]  Guang Gong,et al.  On Data Aggregation with Secure Bloom Filter in Wireless Sensor Networks , 2010 .

[12]  R. B. Patel,et al.  EIRDA: An Energy Efficient Interest based Reliable Data Aggregation Protocol for Wireless Sensor Networks , 2011 .

[13]  Hasan Çam,et al.  Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.

[14]  Xiaodong Lin,et al.  MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.

[15]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[16]  Issa M. Khalil,et al.  SECOS : Key Management for Scalable and Energy Efficient Crypto On Sensors , 2003 .

[17]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[18]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[19]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[20]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[21]  Guojun Wang,et al.  Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[22]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[23]  Symeon Papavassiliou,et al.  Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies , 2011, Int. J. Sens. Networks.

[24]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[25]  K. Pradeepa,et al.  Design and Implementation Issues of Clustering in Wireless Sensor Networks , 2012 .

[26]  Keqiu Li,et al.  Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks , 2011, Comput. Commun..

[27]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[28]  Shiuh-Pyng Shieh,et al.  Secure encrypted-data aggregation for wireless sensor networks , 2010, Wirel. Networks.

[29]  Tanbhir Hoq,et al.  Micro hydro power: promising solution for off-grid renewable energy source , 2011 .

[30]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[31]  Georg Carle,et al.  Applications of Wireless Sensor Networks , 2010 .

[32]  V. D. Mytri,et al.  A Reliable Data Aggregation Forwarding Protocol for Wireless Sensor Networks , 2012 .

[33]  Dirk Westhoff,et al.  A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.

[34]  Neha Singh,et al.  Energy Efficient Techniques for Data aggregation and collection in WSN , 2012 .

[35]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[36]  V. D. Mytri,et al.  An Adaptive Energy Efficient Forwarding Data Aggregation and QoS Protocol for Wireless Sensor Networks , 2012 .

[37]  Ahmad Alkhatib,et al.  Wireless Sensor Network- An Advanced Survey , 2013 .

[38]  Shaojie Tang,et al.  A Delay-Efficient Algorithm for Data Aggregation in Multihop Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[39]  Ameer Ahmed Abbasi,et al.  A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..

[40]  Yu-Chee Tseng,et al.  Wireless sensor networks , 2008 .

[41]  Lalit M. Patnaik,et al.  Secure Data Aggregation Using Clusters in Sensor Networks , 2009 .

[42]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[43]  Jacques M. Bahi,et al.  Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[44]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.