Abstract
In some sensor network environments there is a need to protect the privacy of the individual readings as well as to ensure the integrity of the aggregated result. Many prior solutions have proposed schemes that protect either privacy or integrity, but very little work has been done on achieving both goals. In this paper, we extend a previously defined splitting scheme to provide privacy and integrity when computing the SUM aggregate. The scheme that we present achieves a usable level of privacy and integrity for the sum aggregation and does not require the usage of expensive cryptography. We also experimentally demonstrate the effectiveness of our techniques.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alzaid, H., Foo, E., Nieto, J.G.: Secure data aggregation in wireless sensor network: a survey. In: AISC 2008: Proceedings of the Sixth Australasian Conference on Information Security, pp. 93–105. Australian Computer Society, Inc., Darlinghurst (2008)
Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical report (2005)
Castelluccia, C., Soriente, C.: Abba: A balls and bins approach to secure aggregation in wsns. In: WiOpt 2008:Sixth International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (2008)
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: MOBIQUITOUS 2005: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117. IEEE Computer Society, Washington, DC, USA (2005)
Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 278–287. ACM, New York (2006)
Chen, J.-Y., Pandurangan, G., Xu, D.: Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. In: IPSN 2005: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, p. 46. IEEE Press, Piscataway, NJ, USA (2005)
Frikken, K.B., Dougherty IV, J.A.: An efficient integrity-preserving scheme for hierarchical sensor aggregation. In: WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security, pp. 68–76. ACM, New York (2008)
Gupta, I., van Renesse, R., Birman, K.P.: Scalable fault-tolerant aggregation in large process groups. In: DSN 2001: Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), pp. 433–442. IEEE Computer Society, Washington, DC, USA (2001)
He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007)
Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of 2003 Symposium on Applications and the Internet Workshops, pp. 384–391 (January 2003)
Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of network density on data aggregation in wireless sensor networks. In: ICDCS 2002: Proceedings of the 22 nd International Conference on Distributed Computing Systems, p. 457. IEEE Computer Society, Washington, DC, USA (2002)
Jadia, P., Mathuria, A.: Efficient Secure Aggregation in Sensor Networks. In: Bougé, L., Prasanna, V.K. (eds.) HiPC 2004. LNCS, vol. 3296, pp. 40–49. Springer, Heidelberg (2004)
Maniatis, P., Garofalakis, M., Hellerstein, J.: Proof sketches: Verifiable in-network aggregation. In: Proceedings of the IEEE 23rd International Conference on Data Engineering (2007)
Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)
Manjhi, A., Nath, S., Gibbons, P.B.: Tributaries and deltas: efficient and robust aggregation in sensor network streams. In: SIGMOD 2005: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 287–298. ACM Press, New York (2005)
Nath, S., Gibbons, P.B., Seshan, S., Anderson, Z.R.: Synopsis diffusion for robust aggregation in sensor networks. In: SenSys 2004: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 250–262. ACM Press, New York (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)
Przydatek, B., Song, D., Perrig, A.: Sia: secure information aggregation in sensor networks. In: SenSys 2003: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255–265. ACM, New York (2003)
Roberto, D.P., Pietro, M., Refik, M.: Confidentiality and integrity for data aggregation in wsn using peer monitoring. In: Security and Communication Networks, pp. 181–194 (2009)
Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367. ACM, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Frikken, K.B., Zhang, Y. (2012). Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds) e-Business and Telecommunications. ICETE 2010. Communications in Computer and Information Science, vol 222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25206-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-25206-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25205-1
Online ISBN: 978-3-642-25206-8
eBook Packages: Computer ScienceComputer Science (R0)