• Corpus ID: 16018664

An Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks

@inproceedings{Horng2007AnEC,
  title={An Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks},
  author={Gwoboa Horng and Chien-Lung Wang and Tzungher Chen},
  year={2007}
}
Soon after wireless sensor networks (WSNs) have attracted much attention both in industry and academia, maintaining the security of WSNs, especially end-to-end confidentiality, becomes a challenging problem. A sensor device has the limited computation capability, battery power, less memory size, and unreliable communication protocols. In order to save the overall energy resources and maintain the security of WSN, we need to reduce the amount of encrypted data transmitted. One approach is to… 

Tables from this paper

Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey
TLDR
Concealed Data Aggregation based on privacy homomorphism (PH) gives a critical solution for energy efficient secure data aggregation in WSNs and reduces the frequency of node compromise attacks in aggregator nodes.
Symmetric concealed data aggregation techniques in wireless sensor networks using Privacy Homomorphism: A review
TLDR
Some of the concealed data aggregation techniques that optimizes the lifetime of wireless sensor networks by providing secure data aggregation and protect the confidentiality of data throughout the network are reviewed.

References

SHOWING 1-10 OF 17 REFERENCES
Efficient aggregation of encrypted data in wireless sensor networks
TLDR
This paper proposes a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data and shows that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.
On Concealed Data Aggregation for Wireless Sensor Networks
TLDR
This paper describes and evaluates three algorithms that allow the concealed data aggregation (CDA) in wireless sensor networks and evaluates the two biggest issues of the very promising CMT algorithm.
Secure aggregation for wireless networks
  • Lingxuan Hu, David Evans
  • Computer Science
    2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
  • 2003
TLDR
This work presents a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises, and takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.
SecureDAV: a secure data aggregation and verification protocol for sensor networks
TLDR
This paper presents a protocol for establishing cluster keys in sensor networks using verifiable secret sharing using elliptic curve cryptosystems and develops a secure data aggregation and verification protocol that ensures that the base station never accepts faulty aggregate readings.
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation
TLDR
An approach that conceals sensed data end-to-end by still providing efficient and flexible in-network data aggregation is presented and it is shown that the approach is feasible for the class of "going down" routing protocols.
Efficient Secure Aggregation in Sensor Networks
TLDR
A secure data aggregation protocol for sensor networks that uses encryption for confidentiality, but without requiring decryption at intermediate nodes is presented, using two-hop pairwise keys to provide integrity while minimizing the communication required between the base station and sensor nodes.
How public key cryptography influences wireless sensor node lifetime
TLDR
The results show that the application of strong cryptography is feasible and the influence to the lifetime is not significant, Nevertheless, the public key cryptography shall be used with care.
Sensor Network Security: More Interesting Than You Think
TLDR
This position paper takes the first steps towards producing a comprehensive security model that is tailored for sensor networks, and outlines security properties that must be considered when designing a secure sensor network.
Secure hierarchical in-network aggregation in sensor networks
TLDR
This work presents the first algorithm for provably secure hierarchical in-network data aggregation, and is guaranteed to detect any manipulation of the aggregate by the adversary beyond what is achievable through direct injection of data values at compromised nodes.
A survey on sensor networks
TLDR
The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
...
...