Efficient aggregation of encrypted data in wireless sensor networks
- 1 January 2005
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. One well-known approach is to aggregate sensor data (e.g., by adding) along the path from sensors to the sink. Aggregation becomes especially challenging if end-to-end privacy between sensors and the sink is required. In this paper, we propose a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data. The new cipher only uses modular additions (with very small moduli) and is therefore very well suited for CPU-constrained devices. We show that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.Keywords
This publication has 10 references indexed in Scilit:
- Modeling on Secure Data Aggregation of Wireless Sensor Networks Based on Evaluation of CreditabilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- Resilient aggregation in sensor networksPublished by Association for Computing Machinery (ACM) ,2004
- Security in wireless sensor networksCommunications of the ACM, 2004
- SIAPublished by Association for Computing Machinery (ACM) ,2003
- Secure routing in wireless sensor networks: attacks and countermeasuresPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Denial of service in sensor networksComputer, 2002
- TAGPublished by Association for Computing Machinery (ACM) ,2002
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978