An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks

Abstract In wireless sensor networks, data aggregation plays an important role in reducing energy consumption. Recently, research has focused on secure data aggregation due to the open and hostile environment deployed. The Homomorphic Encryption (HE) scheme is extensively used to protect data confidentiality. However, HE-based data aggregation schemes have the following drawbacks: malleability, unauthorized aggregation, and limited aggregation functions. To solve these problems, we propose a secure data aggregation scheme by combining homomorphic encryption technology with a signature scheme. The proposed scheme makes three contributions. First, it achieves in-network false data filtering to avoid the consumption of unnecessary transmission energy. Second, it ensures authorized aggregation and the base station can identify the origin and validity of the messages received. Finally, the base station can recover the original sensing data, and thus can perform arbitrary aggregation operations. Comprehensive analyses and comparisons were conducted to prove the feasibility and efficiency of our scheme. The results show that our scheme performs effectively in terms of communication overhead, computational overhead, energy consumption, and delay. Additionally, even though the size of the aggregated results is large, our scheme enables the base station to quickly decrypt ciphertexts and obtain the original data unlike its counterparts.

[1]  Liehuang Zhu,et al.  An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[2]  Hung-Min Sun,et al.  CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.

[3]  Zhan Yong-zhao,et al.  Lightweight defense scheme against selective forwarding attacks in wireless sensor networks , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[4]  Qiang Zhou,et al.  A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks , 2014, Sensors.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Kyung-Ah Shim,et al.  A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[8]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[9]  Aggelos Kiayias,et al.  Exact In-Network Aggregation with Integrity and Confidentiality , 2012, IEEE Transactions on Knowledge and Data Engineering.

[10]  Jianxin Li,et al.  Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems , 2012, Ad Hoc Sens. Wirel. Networks.

[11]  Ioana Rodhe,et al.  n-LDA: n-Layers Data Aggregation in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[12]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[13]  A. S. Poornima,et al.  SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[14]  Sencun Zhu,et al.  SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks , 2008 .

[15]  Jia-Lun Tsai,et al.  An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings , 2016, IEEE Transactions on Intelligent Transportation Systems.

[16]  Azzedine Boukerche,et al.  An efficient Markov decision process based mobile data gathering protocol for wireless sensor networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[17]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[18]  J. Jose,et al.  Energy efficient recoverable concealed data aggregation in wireless sensor networks , 2013, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).

[19]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[20]  Dirk Westhoff,et al.  A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.

[21]  Naveen K. Chilamkurti,et al.  A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..

[22]  Azzedine Boukerche,et al.  A Performance Evaluation of a Novel Energy-Aware Data-Centric Routing Algorithm in Wireless Sensor Networks , 2005, Wirel. Networks.

[23]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[24]  Yang Xiao,et al.  Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.

[25]  Sidi-Mohammed Senouci,et al.  A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography , 2015, Ad Hoc Networks.