Skip to main content

Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity

  • Conference paper
  • 922 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 222))

Abstract

In some sensor network environments there is a need to protect the privacy of the individual readings as well as to ensure the integrity of the aggregated result. Many prior solutions have proposed schemes that protect either privacy or integrity, but very little work has been done on achieving both goals. In this paper, we extend a previously defined splitting scheme to provide privacy and integrity when computing the SUM aggregate. The scheme that we present achieves a usable level of privacy and integrity for the sum aggregation and does not require the usage of expensive cryptography. We also experimentally demonstrate the effectiveness of our techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alzaid, H., Foo, E., Nieto, J.G.: Secure data aggregation in wireless sensor network: a survey. In: AISC 2008: Proceedings of the Sixth Australasian Conference on Information Security, pp. 93–105. Australian Computer Society, Inc., Darlinghurst (2008)

    Google Scholar 

  2. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical report (2005)

    Google Scholar 

  3. Castelluccia, C., Soriente, C.: Abba: A balls and bins approach to secure aggregation in wsns. In: WiOpt 2008:Sixth International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (2008)

    Google Scholar 

  4. Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: MOBIQUITOUS 2005: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117. IEEE Computer Society, Washington, DC, USA (2005)

    Chapter  Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 278–287. ACM, New York (2006)

    Google Scholar 

  6. Chen, J.-Y., Pandurangan, G., Xu, D.: Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. In: IPSN 2005: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, p. 46. IEEE Press, Piscataway, NJ, USA (2005)

    Google Scholar 

  7. Frikken, K.B., Dougherty IV, J.A.: An efficient integrity-preserving scheme for hierarchical sensor aggregation. In: WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security, pp. 68–76. ACM, New York (2008)

    Google Scholar 

  8. Gupta, I., van Renesse, R., Birman, K.P.: Scalable fault-tolerant aggregation in large process groups. In: DSN 2001: Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), pp. 433–442. IEEE Computer Society, Washington, DC, USA (2001)

    Google Scholar 

  9. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007)

    Google Scholar 

  10. Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of 2003 Symposium on Applications and the Internet Workshops, pp. 384–391 (January 2003)

    Google Scholar 

  11. Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of network density on data aggregation in wireless sensor networks. In: ICDCS 2002: Proceedings of the 22 nd International Conference on Distributed Computing Systems, p. 457. IEEE Computer Society, Washington, DC, USA (2002)

    Google Scholar 

  12. Jadia, P., Mathuria, A.: Efficient Secure Aggregation in Sensor Networks. In: Bougé, L., Prasanna, V.K. (eds.) HiPC 2004. LNCS, vol. 3296, pp. 40–49. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Maniatis, P., Garofalakis, M., Hellerstein, J.: Proof sketches: Verifiable in-network aggregation. In: Proceedings of the IEEE 23rd International Conference on Data Engineering (2007)

    Google Scholar 

  14. Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)

    Article  Google Scholar 

  15. Manjhi, A., Nath, S., Gibbons, P.B.: Tributaries and deltas: efficient and robust aggregation in sensor network streams. In: SIGMOD 2005: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 287–298. ACM Press, New York (2005)

    Google Scholar 

  16. Nath, S., Gibbons, P.B., Seshan, S., Anderson, Z.R.: Synopsis diffusion for robust aggregation in sensor networks. In: SenSys 2004: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 250–262. ACM Press, New York (2004)

    Google Scholar 

  17. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  18. Przydatek, B., Song, D., Perrig, A.: Sia: secure information aggregation in sensor networks. In: SenSys 2003: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255–265. ACM, New York (2003)

    Google Scholar 

  19. Roberto, D.P., Pietro, M., Refik, M.: Confidentiality and integrity for data aggregation in wsn using peer monitoring. In: Security and Communication Networks, pp. 181–194 (2009)

    Google Scholar 

  20. Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367. ACM, New York (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frikken, K.B., Zhang, Y. (2012). Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds) e-Business and Telecommunications. ICETE 2010. Communications in Computer and Information Science, vol 222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25206-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25206-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25205-1

  • Online ISBN: 978-3-642-25206-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics