Abstract

In general information aggregation design that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption. Since aggregators collect data without decryption, adversaries are not able to forge aggregated results by compromising them. However, these schemes are not satisfy multi-application environments. Second, these schemes become insecure in case some sensor nodes are compromised. Third, these schemes do not provide secure counting; thus, they may suffer unauthorized aggregation attacks. Therefore, we propose a new concealed data aggregation scheme extended from Boneh et al.s homomorphic public encryption system. The proposed scheme has three contributions. First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. To prove the proposed schemes robustness and efficiency, we also conducted the comprehensive analyses and comparisons in the end.

Highlights

  • WIRELESS sensor networks (WSNs) consist of thousands of sensor nodes (SN) that gather data from deployed environments

  • Since a lot of operations in CDAMA are based on scalar multiplication on elliptic curve points, skills which accelerate scalar multiplications can enhance the performance of CDAMA

  • We only compare the performance of CDAMA with TinyPEDS [12] and elliptic curve Okamoto-Uchiyama (EC-OU) [2] because CDA [9], [10] and Castelluccia et al.‟s scheme [14] are both symmetric schemes; they are not suitable to compare with asymmetric schemes

Read more

Summary

INTRODUCTION

WIRELESS sensor networks (WSNs) consist of thousands of sensor nodes (SN) that gather data from deployed environments. There are plenty of rich applications proposed for WSNs, such as environment monitoring, accident reporting, and military investigation [1]. Cluster-based WSNs [2] have been proposed. Data aggregation could significantly reduce transmission, it is vulnerable to some attacks. Compromising a CH will allow adversaries to forge aggregated results [4] as similar as compromising all its cluster members. The only solution is to aggregate the cipher texts of different applications separately. The transmission cost grows as the number of the applications increases. An adversary can forge data only in the compromised groups, not the whole system

Aggregation Model
Attack Model
Privacy Homomorphic Cryptosystem
CDA Based on PH
A Concrete Example
Key Distribution
DISCUSSION
Efficient Scalar Multiplication
Size of Cipher texts
Generating Suitable Curves
SECURITY ANALYSIS AND COMPARISON
Candidate Schemes for Comparison
Evaluation Measurements
Evaluation Results
Performance Gain of CDAMA
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call