Skip to main content

Advertisement

Log in

Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data confidentiality and integrity is mounting a challenge. The existing solutions either have large communication and computation overheads or produce inaccurate results. This paper proposes a novel secure data aggregation scheme based on homomorphic encryption in WSNs. The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic signature to check the aggregation data integrity. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. Simulation results and performance analysis show that our mechanism requires less communication and computation overheads than previously known methods. It can effectively preserve data privacy, check data integrity, and achieve high data transmission efficiency. Also, it performs accurate data aggregation rate while consuming less energy to prolong network lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Vuran, M. C., & Akylidiz, I. F. (2010). Wireless sensor networks. New York: Wiley.

    Google Scholar 

  2. Hara, T., Zadorozhny, V. I., & Buchmann, E. (2010). Wireless sensor network technologies for the information explosion era, vol. 278. Stud. Comput. Intell. Berlin:Springer.

  3. Alkhatib, A. A. A., Baicher, G. S., & Darwish, W. K. (January 2013). Wireless Sensor Network—An Advanced Survey. International Journal of Engineering and Innovative Technology (IJEIT), 2(7), 355–369.

  4. Kafetzoglou, S., & Papavassiliou, S. (2011). Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies, International Journal of Sensor Networks, Inderscience Enterprises Ltd., Vol. 10.

  5. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.

    Article  Google Scholar 

  6. Schmitt, C., & Carle, G. (January 2010). Applications for Wireless Sensor Networks. in Chapter in Book: Handbook of research on P2P and grid systems for service- oriented computing: Models, methodologies and applications, Antonopoulos Information Science Publishing.

  7. Xu, X. (Jan. 2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175.

  8. Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.

    Article  Google Scholar 

  9. Maraiya, K., Kant, K., & Gupta, N. (2011). Wireless Sensor Network: A review on data aggregation. International Journal of Scientific & Engineering Research, 2(4), 1–6.

    Google Scholar 

  10. Zheng, J., Xu, X., & Wang, G. (2011). Energy efficient data aggregation scheduling in wireless sensor networks. IEEE 10th international conference on trust, security and privacy in computing and communications, pp. 1662–1667.

  11. Chaudhary, S., Singh, N., & Pathak, A. (2012). Energy efficient techniques for data aggregation and collection in WSN energy. IJCSEA, 2(4), 37–47.

    Article  Google Scholar 

  12. Nithyakalyani, S., & SureshKumar, S. (2012). Optimal clustering algorithm for energy efficient data aggregation in WSN. European Journal of Scientific Research, 78(1), 146–155.

    Google Scholar 

  13. Sethi, H., Prasad, D., & Patel, R. B. (May 2012). EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. IJCA, 22(7), 20–25.

  14. Mathapati, B. S., & Patil, S. R. (2012). A reliable data aggregation forwarding protocol for wireless sensor networks. IJCSNS, 12(5), 90–95.

    Google Scholar 

  15. Prakash, G. L., Thejaswini, M., Manjula, S. H., Venugopal, K. R., & Patnaik, L. M. (2009). Secure data aggregation using clusters in sensor networks: World academy of science. Engnieering and Technology, 51, 32–35.

  16. Jacques, M. B., Christophe, G., & Abdallah, M. (2010). Efficient and robust secure aggregation of encrypted data in sensor networks. In 10th Proceeding of the 2010 4th international conference on sensor technologies and applications, (SENSORCOMM), Washington, DC, USA.

  17. Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Journal of ACM Transactions on Sensor Networks, 5(3), 1–36.

  18. Shih-I, H., Shiuhpyng, S., & Tygar, J. D. (2009). Secure encrypted-data aggregation for wireless sensor networks. Berlin: Springer Science, Business Media, LLC.

    Google Scholar 

  19. Suat, O., & Hasan, C. (2010). Integration of False data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.

  20. Xiaodong, L., Rongxing, L., & Xuemin, S. (2010). MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communication Mobile Computing, 10(6), 843–856.

    Google Scholar 

  21. Zhijun, L., & Guang, G. (2010). On data aggregation with secure bloom filter in wireless sensor networks. Technical Report CACR 2010, University of Waterloo, Waterloo, Ontario, Canada.

  22. Haifeng, U. (2009). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In Proceedings of the 2009 international conference on information processing in sensor networks, (IPSN 2009), Washington, DC, USA, pp. 1–12.

  23. Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In: Global telecommunications conference, GLOBECOM, pp. 2175–2179.

  24. Khalil, I., & Bagchi, S. (2006). Dependable computing system lab. SECOS: Key Management for Scalable and Energy Efficient Crypto on Sensors. Tech Report, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN.

  25. Abbasi, A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.

    Article  Google Scholar 

  26. Hankerson, D., Menezes, A. J., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.

    MATH  Google Scholar 

  27. Mykletun, E., Girao, J., & Westhoff, D. (June 2006). Public key based cryptoschemes for data concealment in wireless sensor networks. Proceedings of IEEE International Conference on Communications, 5, 2288–2295.

  28. Pradeepa, K., Anne, W. R., & Duraisamy, S. (2012). Design and implementation issues of clustering in wireless sensor networks. International Journal of Computer Applications, 47(11), 23–28.

    Article  Google Scholar 

  29. Ozdemir, S. (July 2007). Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In Proceedings of IEEE international conference on pervasive services, pp. 165–168.

  30. Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1–15.

    Article  Google Scholar 

  31. Domingo-Ferrer, J. (2003). A provably secure additive and multiplicative privacy homomorphism. In 6th ISC conference, pp. 471–483.

  32. Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In Proceedings of the Annals International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 98), pp. 308–318.

  33. Okamoto, T., Uchiyama, S., & Fujisaki, E. (2009). Epoc: Efficient probabilistic publickey encryption, Technical Report.

  34. Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of EUROCRYPT, 2003, 416–432.

    MathSciNet  Google Scholar 

  35. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.

    Article  Google Scholar 

  36. Liu, J., Baek, J., Zhou, J., et al. (2010). Efficient online/offline identity-based signature for wireless sensor network. International Journal of Information Security, 9(4), 287–296.

    Article  Google Scholar 

  37. Sun, B., Osborne, L., Xiao, Y., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications Magazine, 14(5), 56–63.

    Article  Google Scholar 

  38. Levis, P., Lee, N., Welsh, M., & Culler, D. (2003). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st international conference on embedded networked sensor systems. ACM, pp. 126–137.

  39. Liu, A., & Ning, P. (April 2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (IPSN 2008), SPOTS Track, pp. 245–256.

  40. Li, W., Chou, C., & Lin, Z. (2006). Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks. In Proc. Nat’l Computer Symp. Conf.

  41. Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE third international conference pervasive computing and communications (PERCOM ’06).

  42. Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34, 591–597.

    Article  Google Scholar 

  43. Raghunathan, V., Schurgers, C., Park, S., & Srivastana, M. B. (2002). Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19(2), 40–50.

    Article  Google Scholar 

  44. Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soufiene Ben Othman.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Othman, S.B., Bahattab, A.A., Trad, A. et al. Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption. Wireless Pers Commun 80, 867–889 (2015). https://doi.org/10.1007/s11277-014-2061-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2061-z

Keywords

Navigation