Abstract
Data aggregation has been put forward as an essential technique to achieve power efficiency in sensor networks. Data aggregation consists of processing data collected by source nodes at each intermediate node enroute to the sink in order to reduce redundancy and minimize bandwidth usage.
The deployment of sensor networks in hostile environments call for security measures such as data encryption and authentication to prevent data tampering by intruders or disclosure by compromised nodes. Aggregation of encrypted and/or integrity-protected data by intermediate nodes that are not necessarily trusted due to potential node compromise is a challenging problem. We propose a secure data aggregation scheme that ensures that sensors participating to the aggregation mechanism do not have access to the content of the data while adding their sensed values thanks to the use of an efficient homomorphic encryption scheme. We provide a layered secure aggregation mechanism and the related key attribution algorithm that limits the impact of security threats such as node compromises. We also evaluate the robustness of the scheme against node failures and show that such failures are efficiently recovered by a small subset of nodes that are at most m hops away from the failure.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)
Castellucia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems, Mobiquitous, San Diego, CA, July (2005)
Girao, J., Westhoff, D., Schneider, M.: CDA:Concealed Data Aggregation in Wireless Sensor Networks. In: Proceedings of ACM WiSe’04, ACM Press, New York (2004)
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: IEEE Symposium on Foundations of Computer Science, pp. 394–403. IEEE Computer Society Press, Los Alamitos (1997)
Pannetrat, A., Molva, R.: Multiple layer encryption for multicast groups. In: The proceedings of CMS’02, Portoroz, Slovenia, September (2002)
of Standards, N.I., Technology: Advanced Encryption Standard (2001)
Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multiuser setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)
Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proceedings of IEEE ICC’05, Korea, IEEE Computer Society Press, Los Alamitos (2005)
Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, Springer, Heidelberg (2002)
Girao, J., Westhoff, D.: Concealed data aggregation in WSNs (demo). In: Römer, K., Karl, H., Mattern, F. (eds.) EWSN 2006. LNCS, vol. 3868, Springer, Heidelberg (2006)
Crossbow products (2004), http://www.xbow.com/Products/WirelessSensorNetworks.htm
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS’02, Washington D.C., ACM Press, New York (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Önen, M., Molva, R. (2007). Secure Data Aggregation with Multiple Encryption. In: Langendoen, K., Voigt, T. (eds) Wireless Sensor Networks. EWSN 2007. Lecture Notes in Computer Science, vol 4373. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69830-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-69830-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69829-6
Online ISBN: 978-3-540-69830-2
eBook Packages: Computer ScienceComputer Science (R0)