Skip to main content
Log in

Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Data fragmentation and dispersion is recognized as a way of providing confidentiality and availability of data stored inside unattended wireless sensor networks. This paper introduces an additively homomorphic encryption and fragmentation scheme (AHEF). AHEF replaces additively homomorphic secret sharing used in state-of-the-art techniques with additively homomorphic fragmentation. This change has a significant impact on the volume of data stored inside the sensors which in turn supports lower transmission costs. Both, storage and transmission costs are reduced by a factor of at least 2. Moreover, by reducing the number of required computations, AHEF allows sensors to save energy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Di Pietro R, Mancini LV, Soriene C, Spognardi A, Tsudik G (2008). In: Sixth annual IEEE international conference on pervasive computing and communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp 185–194. https://doi.org/10.1109/PERCOM.2008.31

  2. Di Pietro R, Mancini LV, Soriente C, Spognardi A, Tsudik G (2009). IEEE Trans Comput 58 (11):1500. https://doi.org/10.1109/TC.2009.109

    Article  MathSciNet  Google Scholar 

  3. Ren Y , Oleshchuk V, Li FY (2009). In: 2009 2nd IFIP Wireless Days (WD), pp 1–6. https://doi.org/10.1109/WD.2009.5449662

  4. Kapusta K, Memmi G, Noura H (2017). In: 1st cyber security in networking conference, CSNet 2017, Rio de Janeiro, Brazil, October 18-20, 2017, pp 1–8. https://doi.org/10.1109/CSNET.2017.8241998

  5. Ren W, Ren Y, Zhang H (2008). In: 2008 IEEE/IFIP international conference on embedded and ubiquitous computing, vol 2, pp 318–323. https://doi.org/10.1109/EUC.2008.76

  6. Wang Q, Ren K, Lou W, Zhang Y (2009). In: IEEE INFOCOM 2009, pp 954–962. https://doi.org/10.1109/INFCOM.2009.5062006

  7. Ren Y, Oleshchuk V, Li FY (2009). In: 2009 3rd international conference on new technologies, mobility and security, pp 1–5. https://doi.org/10.1109/NTMS.2009.5384753

  8. Rabin MO (1989). J. ACM 36(2):335. https://doi.org/10.1145/62044.62050

    Article  Google Scholar 

  9. Memmi G, Kapusta K, Qiu H (2015). In: 2015 IEEE international conference on cyber security of smart cities, industrial control system and communications (SSIC) 2015, Shanghai, China, pp 1–9. https://doi.org/10.1109/SSIC.2015.7245680

  10. Aliberti G, Di Pietro R, Guarino S, Netw J (2017). Comput Appl 99 (C):146. https://doi.org/10.1016/j.jnca.2017.09.008

    Google Scholar 

  11. Di Pietro R, Verde NV (2011). In: Proceedings of the Fourth ACM conference on wireless network security, ACM, New York, WiSec ’11, pp 11–22. https://doi.org/10.1145/1998412.1998417

  12. Shamir A (1979). Commun ACM 22(11):612. https://doi.org/10.1145/359168.359176

    Article  Google Scholar 

  13. Castelluccia C, Mykletun E, Tsudik G (2005). In: The Second annual international conference on mobile and ubiquitous systems: networking and services, pp 109–117. https://doi.org/10.1109/MOBIQUITOUS.2005.25

  14. Di Pietro R, Guarino S (2013). In: 2013 proceedings IEEE INFOCOM, pp 205–209. https://doi.org/10.1109/INFCOM.2013.6566764

  15. Bohli J, Papadimitratos P, Verardi D, Westhoff D (2011). In: 2011 IEEE 36th conference on local computer networks, pp 994–1002. https://doi.org/10.1109/LCN.2011.6114411

  16. Gonçalves DdO, Costa DG (2015). J Imaging 1(1):4. https://doi.org/10.3390/jimaging1010004. http://www.mdpi.com/2313-433X/1/1/4

    Article  Google Scholar 

  17. Barker EB, Kelsey JM (2011) Recommendation for random number generation using deterministic random bit generators (revised), US Department of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory

  18. Krawczyk H (1994). In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, Springer, London, CRYPTO ’93, pp 136–146. http://dl.acm.org/citation.cfm?id=646758.705700

  19. Choi HB , Ko YB, Lim KW (2018). In: Proceedings of the Third international conference on security of smart cities, industrial control system and communications, SSIC ’18

  20. Hamid MA, Sarkar AMJ (2012). Annales des Télécommunications 67(9-10):455. https://doi.org/10.1007/s12243-011-0278-3

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the reviewers of this work as well as professor Roberto Di Pietro for his remarks and encouragements.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Katarzyna Kapusta.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kapusta, K., Memmi, G. & Noura, H. Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks. Ann. Telecommun. 74, 157–165 (2019). https://doi.org/10.1007/s12243-018-0684-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-018-0684-x

Keywords