Skip to main content

A Secure Data Aggregation Scheme for Wireless Sensor Networks

  • Conference paper
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops (ISPA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4743))

Abstract

The proliferation of sensor networks provides a promising solution for a variety of ubiquitous data services, but it challenges the data security and privacy because of its unfavorable deployment nature of being prone to physical attacks with circumscribed source available. Considering the data redundancy, energy constraint, and security requirement, this paper proposed a secure data aggregation scheme which supports end-to-end encryption using privacy homomorphism as well as hop-by-hop verification using ECC based MAC in cluster based sensor networks. The analytic comparing results show that our scheme has higher resistance against eavesdropping and fabricating attacks at a little additional computational cost with higher connectivity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Szewczyk, R.: SPINS: Security protocols for sensor networks. Journal of Wireless Networks 8, 521–534 (2002)

    Article  MATH  Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy, Berkeley, pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  3. Gupta, V., Millard, M., Fung, S., Zhu, Y., et al.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. In: Proc. PerCom 2005, Kauai, March, 2005, pp. 247–256 (2005)

    Google Scholar 

  4. Dulman, S., Havinga, P., Jurink, J.: Wave leader election protocol for wireless sensor networks. In: MMSA Workshop, Delft, the Netherlands (December 2002)

    Google Scholar 

  5. Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proc. of SenSys 2003, NewYork, pp. 255–265 (November 2003)

    Google Scholar 

  6. Domingo-Ferrer, J.: A New Privacy Homomorphism and Applications. Information Processing Letters 60(5), 277–282 (1996)

    Article  MathSciNet  Google Scholar 

  7. Girao, J., Schneider, M., Westhoff, D.: CDA: Concealed data aggregation in wireless sensor networks. In: Proc. of the ACM Workshop on Wireless Security, ACM Press, New York (2004)

    Google Scholar 

  8. Lynch, N.: Distributed algorithms. Morgan Kaufmann, San Francisco (1997)

    Google Scholar 

  9. Mittal, V., Demirbas, M., Arora, A.: LOCI: Local Clustering Service for Large Scale Wireless Sensor Networks. Technical Report OSU-CISRC-2/03-TR07 (2003)

    Google Scholar 

  10. An, L., Panos, K., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.3) (Febraury 2007), http://discovery.csc.ncsu.edu/software/TinyECC/

  11. Malan, D.J., Welsh, M., Smith, M.D: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proc. of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, October, 2004, pp. 71–80. IEEE Computer Society Press, Los Alamitos (2004)

    Chapter  Google Scholar 

  12. Haodong, W., Bo, S., Qun, L.: Elliptic Curve Cryptography Based Access Control in Sensor Networks. International Journal of Security and Networks, 127–137 (2006)

    Google Scholar 

  13. Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proc. of the 2004 Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132 (2004)

    Google Scholar 

  14. Tanveer, Z., Albert, Z.: A Security Framework for Wireless Sensor Networks. In: SAS 2006, pp. 49–53 (2006)

    Google Scholar 

  15. Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proc. of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71–80. IEEE Computer Society Press, Los Alamitos (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Parimala Thulasiraman Xubin He Tony Li Xu Mieso K. Denko Ruppa K. Thulasiram Laurence T. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, S.Q., Kim, D.S., Park, J.S. (2007). A Secure Data Aggregation Scheme for Wireless Sensor Networks. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74767-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74766-6

  • Online ISBN: 978-3-540-74767-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics