Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks

Vivaksha J. Jariwala, Devesh C. Jinwala

2014

Abstract

The Wireless Sensor Networks (WSNs) protocols commonly use in-network processing to optimize the communication costs. In-network processing involves processing of the sensed data on-the-fly during the course of the communication to the base station. However, due to the fusion of the data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation.One of the approaches to ensure secure data aggregation is to use encrypted sensor data for processing, using homomorphic encryption. Our research here is aimed to propose an approach that uses homomorphic encryption and appropriate data integrity mechanisms to offer confidentiality, privacy and data integrityfor secure data aggregation in wireless sensor networks.

References

  1. E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi. In-network aggregation techniques for wire less sensor networks: a survey. Wireless Communications, IEEE, Vol.14, No.2, pp.70,87, April 2007.
  2. Chris Karlof, Naveen Sastry, David Wagner. TinySec: A link layer security architecture for wireless sensor networks. InProceedings of the 2nd international conference on Embedded Networked Sensor Systems SenSys 7804, ACM, New York, NY, USA, pp. 162-175, 2004.
  3. Tieyan Li, Hongjun Wu, Xinkai Wang, Feng Bao. SenSec: Sensor Security Framework for TinyOS. In Proceedings of the Second International Workshop on Networked Sensing Systems, San Diego, California, USA, pp.145-150, 2005.
  4. Ramesh Rajagopalan and Pramod K. Varshney. Data aggregation techniques in sensor networks: A survey. Comm. Surveys Tutorials, IEEE, Vol. 8, pp. 48-63, 2006.
  5. VivakshaJariwala, Asha Munjpara, DeveshJinwala, Dhiren Patel. Comparative Evaluation of ECC Based Homomorphic Encryption Algorithms in TOSSIM for Wireless Sensor Networks. In Proceedings of the National Workshop on Cryptology, Cryptology Research Society of India and VIT, Vellore, TN, pp. 1-14, 2012.
  6. Don Johnson, Alfred Menezes and Scott Vanstone.The Elliptic Curve Digital Signature Algorithm (ECDSA).International Journal of Information Security, Vol. 1, No. 1, SpringerVerlag, pp. 36-63, 2001.
  7. Alzaid Hani, Foo Ernest, and Nieto Juan Gonzalez. Secure data aggregation in wireless sensor network: a survey. In Proceedings of the sixth Australasian conference on Information security (AISC 7808), Australian Computer Society, pp. 93-105, 2008.
  8. Josep Ferrer and Domingo.A new privacy homomorphism and applications.Inf. Process. Lett., Vol. 60, No. 5, pp. 277-282, 1996.
  9. Xiaoyan Wang; Jie Li; Xiaoning Peng; BeijiZou.Secure and Efficient Data Aggregation for Wireless Sensor Networks. In Proceeding of the Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd , pp.1-5, 6-9 Sept. 2010.
  10. ClaudeCastelluccia, EinarMykletun, and Gene Tsudik. Effcient aggregation of encrypted data in wireless sensor networks.In Proceeding of the MobiQuitous, IEEE Computer Society, pp. 109-117, 2005.
  11. Poornima, A.S.; Amberker, B.B. SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks. In Proceeding of the 7th International Conference of Wireless And Optical Communications Networks (WOCN), pp.1-5, 6-8 Sept. 2010.
  12. Jacques M. Bahi, Christophe Guyeux, and AbdallahMakhoul. Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks. In Proceedings of the 2010 Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM 7810), IEEE Computer Society, Washington, DC, USA, pp. 472-477, 2010.
  13. SuatOzdemir and Yang Xiao. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks.Comput.Netw., Vol. 55, No. 8, pp. 1735-1746, 2011.
  14. SuatOzdemir and Yang Xiao. Hierarchical Concealed Data Aggregation for Wireless Sensor Networks, 2009.
  15. AjayJangra, Priyanks and Richa. Cb-SDA: Cluster-based Secure Data Aggregation for Private Data in WSN. Wireless and Mobile Technologies, Vol. 1, No. 1,Science and Education Publishing pp. 37-41, 2013.
  16. Shaik Mohammad Rafi and K. Subbarao. Secure Data Aggregation In Wireless Networks. International Journal of Research in Computer and Communication Technology, Vol 3, Issue 1, pp. 87-93, January- 2014
  17. TaochunWang,Xiaolin Qinand Liang Liu. An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks.International Journal of Distributed Sensor Networks.Volume 2013.
  18. J. Hill, et al. System Architecture Directions for Networked Sensors. In Proceedings of 9th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), ACM Press, pp. 93-104, 2000.
  19. A. Liu, P. Kampanakis, P. Ning. TinyECC: Elliptic curve cryptography for sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Net works, pp. 245-256, 2008.
  20. David Gay, Phil Levis, Rob von Behren, Matt Welsh, Eric Brewer, and David Culler. The nesC language: A holistic approach to network embedded systems. In Programming Language Design and Implementation (PLDI), June 2003.
  21. Philip Levis and Nelson Lee. TOSSIM: A Simulator for TinyOS Networks Version 1.0 June 26, 2003.
  22. Ben L. Titzer, Daniel Lee, and Jens Palsberg. Avrora: Scalable sensor network simulation with precise timing. In Proceedings of the 4th Intl. Conf. on Information Processing in Sensor Networks (IPSN), Los Angeles, CA, April 2005.
Download


Paper Citation


in Harvard Style

Jariwala V. and Jinwala D. (2014). Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks . In Proceedings of the 11th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2014) ISBN 978-989-758-031-4, pages 49-60. DOI: 10.5220/0004980100490060


in Bibtex Style

@conference{wosis14,
author={Vivaksha J. Jariwala and Devesh C. Jinwala},
title={Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks},
booktitle={Proceedings of the 11th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2014)},
year={2014},
pages={49-60},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004980100490060},
isbn={978-989-758-031-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2014)
TI - Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks
SN - 978-989-758-031-4
AU - Jariwala V.
AU - Jinwala D.
PY - 2014
SP - 49
EP - 60
DO - 10.5220/0004980100490060