Advanced Search
Volume 37 Issue 12
Jan.  2016
Turn off MathJax
Article Contents
Ding Chao, Yang Li-jun, Wu Meng. A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
Citation: Ding Chao, Yang Li-jun, Wu Meng. A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208

A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

doi: 10.11999/JEIT150208
Funds:

The National 973 Program of China (2011CB302903)

  • Received Date: 2015-02-05
  • Rev Recd Date: 2015-08-25
  • Publish Date: 2015-12-19
  • To address the contradiction between data aggregation and data security in Wireless Sensor Networks (WSNs), a recoverable privacy-preserving integrity-assured data aggregation scheme is proposed based on the technologies of privacy homomorphism and aggregate message authentication code. The proposed scheme enables the Base Station (BS) to recover all the original sensing data from the final aggregated results, which makes it possible to verify the integrity of each sensing data and aggregated data, and perform any further operations on them on demand. The security analysis shows that the proposal not only provides the data privacy and data integrity, but also resists against unauthorized aggregation attack and aggregator capture attack; besides, it is able to detect and locate the malicious nodes which injects false data to the network in a certain range. The performance analysis shows that the proposed scheme has remarkable advantages over existing schemes in terms of computation and communication overhead. In order to evaluate the performance and feasibility of the proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate the proposed scheme is feasible and efficient for resource-constrained WSNs.
  • loading
  • Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of 5th IEEE International Conference on Communications (ICC05), Seoul, Korea, 2005: 3044-3049.
    Lin Y H, Chang S Y, and Sun H M. CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(7): 1471-1483.
    Mykletun E, Girao J, and Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks[C]. Proceedings of 6th International Conference on Communication (ICC06), Istanbul, Turkey, 2006: 2288-2295.
    Taeho J, Mao X F, Li X Y, et al.. Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation[C]. Proceedings of 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, 2013: 2634-2642.
    Yang Y, Wang X, Zhu S, et al.. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information System Security, 2008, 11(4): 1-43.
    Zhu L, Yang Z, Li M, et al.. An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7): 718-720.
    Niu S, Wang C, Yu Z, et al.. Lossy data aggregation integrity scheme in wireless sensor networks[J]. Computers Electrical Engineering, 2013, 39(6): 1726-1735.
    OzeDemir S and Cam H. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 736-749.
    赵小敏, 梁学利, 蒋双双, 等. 安全的WSN数据融合隐私保护方案设计[J]. 通信学报, 2014, 35(11): 154-161.
    Zhao Xiao-min, Liang Xue-li, Jiang Shuang-shuang, et al.. Design of secure privacy-preserving data aggregation scheme for wireless sensor network[J]. Journal on Communications, 2014, 35(11): 154-161.
    Sun H, Chen C, and Lin Y. RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(4): 727-734.
    Ozdemir S and Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011, 55(8): 1735-1746.
    Zhou Q, Yang G, and He L. A secure-enhanced data aggregation based on ECC in wireless sensor networks[J]. Sensors (Basel, Switzerland), 2014, 14(4): 6701-6721.
    Papadopoulos S, Kiayias A, and Papadias D. Exact in-network aggregation with integrity and confidentiality[J]. IEEE Transactions on Knowledge Data Engineering, 2012, 24(10): 1760-1773.
    Katz J and Lindell A. Aggregate message authentication codes[C]. Proceedings of the Cryptographers Track at the RSA Conference, San Francisco, CA, USA, 2008: 155-169.
    Rivest R, Adleman L, and Dertouzos M. Foundations of Secure Computation[M]. Academia Press, 1978: 169-179.
    Peter S, Westhoff D, and Castelluccia C. A survey on the encryption of convergecast traffic with in-network processing[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1410) PDF downloads(655) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return