Data Aggregation Scheme for WSN with Privacy Protection

Article Preview

Abstract:

Data aggregation is an important method to reduce redundant transmissions in wireless sensor networks (WSNs). Authors proposed a secure data aggregation scheme for WSNs based on one-way function. The aggregators completed data aggregation, identity authentication and integrity checking without decrypting the cipher-text and ensured the privacy of transmitted data. Compared with related scheme, the proposed scheme has higher security in terms of resilient against active attack, node compromise attack and reduces the energy consumption effectively.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1671-1674

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Intanagonwiwat, C Govindan, R Estrin, D Heidemann. Directed diffusion for wireless sensor networking[J]. In IEEE/ ACM trans- actions on networking, 2003, 11(1): 2–16.

DOI: 10.1109/tnet.2002.808417

Google Scholar

[2] I. N. Al-Karaki, R. UI-Mustafa, A. E. Kamal. Data aggregation in wireless sensor networks-exact and approximate algorithms, High Performance Switching and Routing. Iowa, USA, 2004: 241– 245.

DOI: 10.1109/hpsr.2004.1303478

Google Scholar

[3] T. Aonishi, T. Matsuda, et al. Impact of aggregation efficiency on GIT-routing for wireless sensor networks[C], Proc of the 2006 International Conference Workshops on Parallel Processing. Ohio, USA, 2006:151–158.

DOI: 10.1109/icppw.2006.41

Google Scholar

[4] L. A. Villas, D. L. Guidoni, R. B. Ara´ujo, A. Boukerche. A scalable and dynamic data aggregation aware routing protocol for wireless sensor networks, in proc of the 13th ACM international con- ference on Modeling, analysis, and simulation of wireless and mobile systems. USA, IEEE Society Press, 2010: 110–117.

DOI: 10.1145/1868521.1868540

Google Scholar

[5] J. Domingo-Ferrer, A provably secure additive and multiplicative privacy homomorphism, in: Proceedings of the 5th International Conference on Information Security, ISC '02, 2002,471–483.

DOI: 10.1007/3-540-45811-5_37

Google Scholar

[6] Acharya, M, Girao, J, Secure comparison of encrypted data in wireless sensor networks, In proc of the 3rd international symposium on modelling and optimization in mobile, ad hoc, and wireless networkks. Trentino, Italy, 2005: 47–53.

DOI: 10.1109/wiopt.2005.44

Google Scholar

[7] CAM H,OZDEMIR S. Energy-efficient security protocol for wireless sensor networks, Proceedings of IEEE VTC Fall 2003 Conference. New York, USA, 2003:2981- 2984.

DOI: 10.1109/vetecf.2003.1286170

Google Scholar

[8] Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar. Secure encrypted- data aggregation for Wireless Sensor Network. Springer Wireless Neworks, 2010(16):915-927.

DOI: 10.1007/s11276-009-0177-y

Google Scholar