Skip to main content

Efficient Secure Aggregation in Sensor Networks

  • Conference paper
High Performance Computing - HiPC 2004 (HiPC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3296))

Included in the following conference series:

Abstract

In many applications of sensor networks, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. The messages that are relayed in the data aggregation hierarchy may need confidentiality. We present a secure data aggregation protocol for sensor networks that uses encryption for confidentiality, but without requiring decryption at intermediate nodes. A salient feature of the protocol is the use of two-hop pairwise keys to provide integrity while minimizing the communication required between the base station and sensor nodes. We analyze the performance of our protocol and compare its efficiency with a protocol proposed by Hu and Evans.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karl, H., Loebbers, M., Nieberg, T.: A data aggregation framework for wireless sensor networks. In: Proc. Dutch Technology Foundation ProRISC Workshop on Circuits, Systems and Signal Processing, Veldhoven, Netherlands (2003)

    Google Scholar 

  2. Deng, J., Han, R., Mishra, S.: Security support for in-network processing in wireless sensor networks. In: Proc. 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN), pp. 83–93 (2003)

    Google Scholar 

  3. Zhao, J., Govindan, R., Estrin, D.: Computing aggregates for monitoring wireless sensor networks. In: Proc. IEEE International Workshop on Sensor Net Protocols and Applications, pp. 139–148 (2003)

    Google Scholar 

  4. Przydatek, B., Song, D., Perrig, A.: SIA: secure information aggregation in sensor networks. In: Proc. 1st International conference on Embedded networked sensor systems, pp. 255–265 (2003)

    Google Scholar 

  5. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: security protocols for sensor networks. Wireless Network journal (WINE) 8, 521–534 (2002)

    Article  MATH  Google Scholar 

  6. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proc. 10th ACM Conference on Computer and Communications Security (CCS), pp. 62–72 (2003)

    Google Scholar 

  7. Hu, L., Evans, D.: Secure aggregation for wireless network. In: Proc. IEEE Symposium on Applications and the Internet Workshops (SAINT 2003), pp. 384–394 (2003)

    Google Scholar 

  8. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE network Magazine 13, 24–30 (1999)

    Article  Google Scholar 

  9. Cam, H., Ozdemir, S., Muthuavinashiappan, D., Nair, P.: Energy-efficient security protocol for wireless sensor networks. In: Proc. 58th IEEE Vehicular Technology Conference, pp. 2981–2984 (2003)

    Google Scholar 

  10. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)

    Google Scholar 

  11. Ahituv, N., Lapid, Y., Neumann, S.: Processing encrypted data. Communications of the ACM 30, 777–780 (1987)

    Article  MATH  Google Scholar 

  12. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  13. Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM Conference on Computer and Communications Security (CCS), pp. 42–51 (2003)

    Google Scholar 

  14. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proc. 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 326–335 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jadia, P., Mathuria, A. (2004). Efficient Secure Aggregation in Sensor Networks. In: Bougé, L., Prasanna, V.K. (eds) High Performance Computing - HiPC 2004. HiPC 2004. Lecture Notes in Computer Science, vol 3296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30474-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30474-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24129-4

  • Online ISBN: 978-3-540-30474-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics