Abstract
Wireless sensor networks perform in-network processing to reduce the energy consumption caused by redundant communication. At the same time, its hostile deployment and unreliable communication raise the security concerns. Thus, there is a need to blend security and data aggregation together to provide secure data aggregation. Secure data aggregation becomes challenging if end-to-end privacy is desired. Privacy homomorphism is used to achieve both en route aggregation and end-to-end privacy of sensor readings. However, privacy homomorphism is inherently malleable. Using privacy homomorphism, one can modify the ciphertext without decrypting it. Thus, it becomes extremely crucial to ensure authentication along with privacy. Symmetric key based Message Authentication Code (MAC) is an efficient solution to provide authentication. In this paper, we use Aggregate Message Authentication Codes (AMAC) to reduce the transmission cost incurred by MAC. However, conflicting requirements of AMAC and data aggregation make its usage limited for certain scenarios. In this paper, we present a cluster based scenario where we can apply AMAC to reduce the number of bits transmitted for authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38, 393–422 (2002)
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. ACM SIGPLAN Notices 35(11), 93–104 (2000)
Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless Communications 14, 70–87 (2007)
Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: 40th International Conference on Communications, IEEE ICC 2005 (May 2005)
Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms, pp. 169–177. Academic Press (1978)
Chan, A.C.F., Castelluccia, C.: On the (im)possibility of aggregate message authentication codes. In: ISIT, pp. 235–239. IEEE (2008)
Katz, J., Lindell, A.Y.: Aggregate message authentication codes. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 155–169. Springer, Heidelberg (2008)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. SenSys 2004, pp. 162–175. ACM, New York (2004)
Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS 2006, pp. 278–287. ACM, New York (2006)
Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks: The International Journal of Computer and Telecommunications Networking 55(8), 1735–1746 (2011)
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks: The International Journal of Computer and Telecommunications Networking 53, 2022–2037 (2009)
Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 5(3), 20:1–20:36 (2009)
Ozdemir, S.: Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In: IEEE International Conference on Pervasive Services, Istanbul, pp. 165–168 (July 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Parmar, K., Jinwala, D.C. (2014). Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks. In: Huang, DS., Jo, KH., Wang, L. (eds) Intelligent Computing Methodologies. ICIC 2014. Lecture Notes in Computer Science(), vol 8589. Springer, Cham. https://doi.org/10.1007/978-3-319-09339-0_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-09339-0_48
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09338-3
Online ISBN: 978-3-319-09339-0
eBook Packages: Computer ScienceComputer Science (R0)