Skip to main content

Secure Data Aggregation with Multiple Encryption

  • Conference paper
Wireless Sensor Networks (EWSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4373))

Included in the following conference series:

Abstract

Data aggregation has been put forward as an essential technique to achieve power efficiency in sensor networks. Data aggregation consists of processing data collected by source nodes at each intermediate node enroute to the sink in order to reduce redundancy and minimize bandwidth usage.

The deployment of sensor networks in hostile environments call for security measures such as data encryption and authentication to prevent data tampering by intruders or disclosure by compromised nodes. Aggregation of encrypted and/or integrity-protected data by intermediate nodes that are not necessarily trusted due to potential node compromise is a challenging problem. We propose a secure data aggregation scheme that ensures that sensors participating to the aggregation mechanism do not have access to the content of the data while adding their sensed values thanks to the use of an efficient homomorphic encryption scheme. We provide a layered secure aggregation mechanism and the related key attribution algorithm that limits the impact of security threats such as node compromises. We also evaluate the robustness of the scheme against node failures and show that such failures are efficiently recovered by a small subset of nodes that are at most m hops away from the failure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  2. Castellucia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems, Mobiquitous, San Diego, CA, July (2005)

    Google Scholar 

  3. Girao, J., Westhoff, D., Schneider, M.: CDA:Concealed Data Aggregation in Wireless Sensor Networks. In: Proceedings of ACM WiSe’04, ACM Press, New York (2004)

    Google Scholar 

  4. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: IEEE Symposium on Foundations of Computer Science, pp. 394–403. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  5. Pannetrat, A., Molva, R.: Multiple layer encryption for multicast groups. In: The proceedings of CMS’02, Portoroz, Slovenia, September (2002)

    Google Scholar 

  6. of Standards, N.I., Technology: Advanced Encryption Standard (2001)

    Google Scholar 

  7. Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  8. Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multiuser setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proceedings of IEEE ICC’05, Korea, IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  10. Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Girao, J., Westhoff, D.: Concealed data aggregation in WSNs (demo). In: Römer, K., Karl, H., Mattern, F. (eds.) EWSN 2006. LNCS, vol. 3868, Springer, Heidelberg (2006)

    Google Scholar 

  12. Crossbow products (2004), http://www.xbow.com/Products/WirelessSensorNetworks.htm

  13. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS’02, Washington D.C., ACM Press, New York (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Koen Langendoen Thiemo Voigt

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Önen, M., Molva, R. (2007). Secure Data Aggregation with Multiple Encryption. In: Langendoen, K., Voigt, T. (eds) Wireless Sensor Networks. EWSN 2007. Lecture Notes in Computer Science, vol 4373. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69830-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69830-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69829-6

  • Online ISBN: 978-3-540-69830-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics