Abstract
The proliferation of sensor networks provides a promising solution for a variety of ubiquitous data services, but it challenges the data security and privacy because of its unfavorable deployment nature of being prone to physical attacks with circumscribed source available. Considering the data redundancy, energy constraint, and security requirement, this paper proposed a secure data aggregation scheme which supports end-to-end encryption using privacy homomorphism as well as hop-by-hop verification using ECC based MAC in cluster based sensor networks. The analytic comparing results show that our scheme has higher resistance against eavesdropping and fabricating attacks at a little additional computational cost with higher connectivity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Perrig, A., Szewczyk, R.: SPINS: Security protocols for sensor networks. Journal of Wireless Networks 8, 521–534 (2002)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy, Berkeley, pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)
Gupta, V., Millard, M., Fung, S., Zhu, Y., et al.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. In: Proc. PerCom 2005, Kauai, March, 2005, pp. 247–256 (2005)
Dulman, S., Havinga, P., Jurink, J.: Wave leader election protocol for wireless sensor networks. In: MMSA Workshop, Delft, the Netherlands (December 2002)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proc. of SenSys 2003, NewYork, pp. 255–265 (November 2003)
Domingo-Ferrer, J.: A New Privacy Homomorphism and Applications. Information Processing Letters 60(5), 277–282 (1996)
Girao, J., Schneider, M., Westhoff, D.: CDA: Concealed data aggregation in wireless sensor networks. In: Proc. of the ACM Workshop on Wireless Security, ACM Press, New York (2004)
Lynch, N.: Distributed algorithms. Morgan Kaufmann, San Francisco (1997)
Mittal, V., Demirbas, M., Arora, A.: LOCI: Local Clustering Service for Large Scale Wireless Sensor Networks. Technical Report OSU-CISRC-2/03-TR07 (2003)
An, L., Panos, K., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.3) (Febraury 2007), http://discovery.csc.ncsu.edu/software/TinyECC/
Malan, D.J., Welsh, M., Smith, M.D: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proc. of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, October, 2004, pp. 71–80. IEEE Computer Society Press, Los Alamitos (2004)
Haodong, W., Bo, S., Qun, L.: Elliptic Curve Cryptography Based Access Control in Sensor Networks. International Journal of Security and Networks, 127–137 (2006)
Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proc. of the 2004 Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132 (2004)
Tanveer, Z., Albert, Z.: A Security Framework for Wireless Sensor Networks. In: SAS 2006, pp. 49–53 (2006)
Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proc. of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71–80. IEEE Computer Society Press, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ren, S.Q., Kim, D.S., Park, J.S. (2007). A Secure Data Aggregation Scheme for Wireless Sensor Networks. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-74767-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74766-6
Online ISBN: 978-3-540-74767-3
eBook Packages: Computer ScienceComputer Science (R0)