Abstract
With the rapid development of the collection devices connected to the Internet of Things, data security has become more important. The sensor node located at the original location of the sensing data is often at the risk of various attacks, because it not only is a data source but also has limited computing power and shortage of energy. As a way to effectively improve the existing problems, secure data aggregation can reduce the energy of wireless sensor network transmission, and how to ensure network security has become a hot spot in research. Through analysis, a concealed data aggregation method suitable for multi-data collaborative encryption is proposed. Its main advantage is that it can simultaneously encrypt n kinds of heterogeneous data, and the base station at the receiving end can completely reconstruct it and separate it effectively and correctly. This method encrypts different types of data at the bottom node at one time, the calculation overhead and resource occupation are relatively small. It is suitable for resource-constrained nodes to ensure the safe use of data. Through simulation experiments and comparison with RCDA-HOMO and Sham Share, the results show that the proposed method is in a reasonable range of energy consumption and processing time on the basis of ensuring the encryption of multiple types of data. It is an effective multi-data aggregation scheme, which has the value of popularization and application on the nodes with limited computing power and resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cui, J., Shao, L., Zhong, H., Xu, Y., Liu, L.: Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Netw. Appl. 11(5), 1–16 (2017). https://doi.org/10.1007/s12083-017-0581-5
Singh, V.K., Singh, V.K., Kumar, M.: In-network data processing based on compressed sensing in WSN: a survey. Wireless Pers. Commun. 96(2), 2087–2124 (2017). https://doi.org/10.1007/s11277-017-4288-y
Zhang, J., Lin, Z., Tsai, P.-W., Xu, L.: Entropy-driven data aggregation method for energy-efficient wireless sensor networks. Inf. Fusion 59, 103–113 (2019)
Bharat, B., Sandeep, V., Amit, K.R.: A secure concealed data aggregation for multiple applications in wireless sensor networks. Int. J. Eng. Res. Manage. (IJERM) 2, 239–243 (2015)
Fang, W., Zhang, W., Zhao, Q., Ji, X., Chen, W., Biruk, A.: Comprehensive analysis of secure data aggregation scheme for industrial wireless sensor network. CMC-Comput. Mater. Continua 61(2), 583–599 (2019)
Jindal, A., Kumar, N., Singh, M.: Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM. Future Gen. Comput. Syst. 108, 1058–1068 (2018)
Yu, S., Liu, M., Dou, W.C., Liu, X.T., Zhou, S.M.: Networking for big data: a survey. IEEE Commun. Surv. Tutorials 19(1), 531–549 (2017)
Yu, S., Zhou, W.L., Guo, S., Guo, M.Y.: A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418–1427 (2016)
Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Netw. 29(6), 83–87 (2015)
Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)
Yu, S., Gu, G., Barnawi, A., Guo, S., Stojmenovic, I.: Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 27(1), 170–179 (2015)
Vinodha, D., Mary Anita, E.A.: Secure data aggregation techniques for wireless sensor networks: a review. Arch. Comput. Meth. Eng. 26(4), 1007–1027 (2018). https://doi.org/10.1007/s11831-018-9267-2
Lin, Y.H., Chang, S.Y., Sun, H.M.: CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks. IEEE Trans. Knowl. Data Eng. 25(7), 1471–1483 (2013)
Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF formulason ciphertexts. Proc Second Int’l Conf Theor. Cryptogr (TCC) 3378, 325–341 (2005)
Prathima, E.G., Prakash, T.S., Venugopal, K.R., Iyengar, S.S., Patnaik, L.M.: SDAMQ: secure data aggregation for multiple queries in wireless sensor networks. Procedia Comput. Sci. 89, 283–292 (2016)
Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55(8), 1735–1746 (2011)
Shim, K.A., Park, C.M.: A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2128–2139 (2015)
Chen, C.M., Lin, Y.H., Lin, Y.C., Sun, H.M.: RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(4), 727–734 (2012)
Zhong, H., Shao, L., Cui, J., Xu, Y.: An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. J. Parallel Distrib. Comput. 111, 1–12 (2018)
Lakshmi, V.S., Deepthi, P.P.: A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks. Int. J. Commun. Syst. 32(1), e3832 (2018)
Kumar, V.: A bilinear pairing based secure data aggregation scheme for WSNs. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC) (2019)
Zhang, P., Wang, J., Guo, K., Wu, F., Min, G.: Multi-functional secure data aggregation schemes for WSNs. Ad Hoc Netw. 69, 86–99 (2018)
Zhao, X., Zhu, J., Liang, X., Jiang, S., Chen, Q.: Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. IET Inf. Secur. 11(2), 82–88 (2017)
Zhang, K., Han, Q., Cai, Z., Yin, G.: RiPPAS: a ring-based privacy-preserving aggregation scheme in wireless sensor networks. Sensors 17(2), 300 (2017)
Elhoseny, M., Yuan, X., El-Minir, H.K., Riad, A.M.: An energy efficient encryption method for secure dynamic WSN. Secur. Commun. Netw. 9(13), 2024–2031 (2016)
Hu, S., Liu, L., Fang, L., Zhou, F., Ye, R.: A novel energy-efficient and privacy-preserving data aggregation for WSNs. IEEE Access 8, 802–813 (2020)
Hua, P., Liu, X., Yu, J., Dang, N., Zhang, X.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018)
Parmar, K., Jinwala, D.C.: Malleability resilient concealed data aggregation in wireless sensor networks. Wireless Pers. Commun. 87(3), 971–993 (2015). https://doi.org/10.1007/s11277-015-2633-6
Alghamdi, W., Rezvani, M., Wu, H., Kanhere, S.S.: Routing-aware and malicious node detection in a concealed data aggregation for WSNs. ACM Trans. Sensor Netw. 15(2), 1–20 (2019)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, Eli (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_26
Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2015)
Acknowledgements
This work was supported by National Key R&D Program of China (2018YFB1800302), Natural Science Foundation of China (61702013), Beijing Natural Science Foundation (KZ201810009011), Science and Technology Innovation Project of North China University of Technology (19XN108).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ma, L., Geng, J., Ma, D., Fu, Y., Xiao, A. (2020). A Multi-data Collaborative Encryption in Concealed Data Aggregation for WSNs. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_27
Download citation
DOI: https://doi.org/10.1007/978-981-15-9129-7_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9128-0
Online ISBN: 978-981-15-9129-7
eBook Packages: Computer ScienceComputer Science (R0)