Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Efficient and provably secure aggregation of encrypted data in wireless sensor networks

Published: 04 June 2009 Publication History

Abstract

Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity) is required. In this article, we propose a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data. Only one modular addition is necessary for ciphertext aggregation. The security of the scheme is based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. We show that aggregation based on this scheme can be used to efficiently compute statistical values, such as mean, variance, and standard deviation of sensed data, while achieving significant bandwidth savings. To protect the integrity of the aggregated data, we construct an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, also based on the indistinguishability property of PRFs.

References

[1]
Bellare, M., Canetti, R., and Krawczyk, H. 1996. Keying hash functions for message authentication. In Proceedings of Advances in Cryptology (CRYPTO'96). Lecture Notes in Computer Science, vol. 1109, Springer. 1--15.
[2]
Boneh, D., Gentry, C., Lynn, B., and Shacham, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of Advances in Cryptology (EUROCRYPT'03). Lecture Notes in Computer Science, vol. 2656, 416--432.
[3]
Buttyán, L., Schaffer, P., and Vajda, I. 2006. RANBAR: RANSAC-based resilient aggregation in sensor networks. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06). 83--90.
[4]
Castelluccia, C., Mykletun, E., and Tsudik, G. 2005. Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of MobiQuitous. 1--9.
[5]
Castelluccia, C. and Soriente, C. 2008. ABBA: Secure aggregation in WSNS - a bins and balls approach. In Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[6]
Chan, A. C.-F. and Castelluccia, C. 2007. On the privacy of concealed data aggregation. In Proceedings of ESORICS. Lecture Notes in Computer Science, vol. 4734, 390--405.
[7]
Chan, A. C.-F. and Castelluccia, C. 2008. On the (im)possibility of aggregate message authentication codes. In Proceedings of the IEEE International Symposium on Information Theory (ISIT).
[8]
Chan, H., Perrig, A., and Song, D. 2006. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS'06). 278--287.
[9]
Eschenauer, L. and Gligor, V. D. 2000. A key management scheme for distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). 41--47.
[10]
Girao, J., Westhoff, D., and Schneider, M. 2004. CDA: Concealed data aggregation in wireless sensor networks. In Proceedings of the ACM Conference on Web Information Systems (WiSe).
[11]
Goldreich, O. 2001. Foundations of Cryptography: Part 1. Cambridge University Press.
[12]
Goldreich, O., Goldwasser, S., and Micali, S. 1986. How to construct random functions. J. ACM 33, 4, 792--807.
[13]
Goldwasser, S. and Micali, S. 1984. Probabilistic encryption. J. Comput. Syst. Sci. 28, 2, 270--299.
[14]
Goldwasser, S., Micali, S., and Rivest, R. 1988. A secure signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281--308.
[15]
Hu, L. and Evans, D. 2003. Secure aggregation for wireless networks. Workshop on Security and Assurance in Ad hoc Networks. http://www.cs.virginia.edu/evans/pubs/wsaan.ps
[16]
Iwata, T. and Kurosawa, K. 2003. OMAC: One-key CBC MAC. In Proceedings of Fast Software Encryption (FSE'03). Lecture Notes in Computer Science, vol. 2887, 129--153.
[17]
Karlof, C., Sastry, N., and Wagner, D. 2004. Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys). 162--175.
[18]
Karlof, C. and Wagner, D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the IEEE Workshop on Sensor Network Protocols and Applications.
[19]
Katz, J. and Yung, M. 2006. Characterization of security notions for probabilistic private-key encryption. J. Cryptology 19, 1, 67--95.
[20]
Madden, S. R., Franklin, M. J., Hellerstein, J. M., and Hong, W. 2002. TAG: a Tiny AGgregation service for ad-hoc sensor networks. In Proceedings of the 5th Annual Symposium on Operating Systems Design and Implementation. 131--146.
[21]
Naor, M., Reingold, O., and Rosen, A. 2002. Pseudorandom functions and factoring. SIAM J. Comput. 31, 5, 1383--1404.
[22]
Naor, M. and Yung, M. 1990. Public-key cryptosystems provably secure against chosen-ciphertext attacks. In Proceedings of the ACM Symposium on Theory of Computing (STOC). 427--437.
[23]
NIST. 2001. Advanced encryption standard. National Institute of Standards and Technology. FIPS PUB 197.
[24]
Perrig, A., Stankovic, J., and Wagner, D. 2004. Security in wireless sensor networks. Commun. ACM 47, 53--57.
[25]
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, D. 2001. SPINS: Security protocols for sensor networks. In Proceedings of the ACM Conference on Mobile Computing and Networking (MOBICOM). 189--199.
[26]
Przydatek, B., Song, D., and Perrig, A. 2003. SIA: Secure information aggregation in sensor networks. In Proceedings of the ACM Conference on Embedded Networks in Sensor Systems (SENSYS). 255--265.
[27]
Rivest, R. L. 1995. The RC5 encryption algorithm. Dr. Dobb's J. 1008.
[28]
Rivest, R. L., Shamir, A., and Adleman, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120--126.
[29]
Vernam, G. S. 1926. Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Amer. Inst. Elect. Eng. 45, 105--115.
[30]
Wagner, D. 2004. Resilient aggregation in sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN).
[31]
Westhoff, D., Girao, J., and Acharya, M. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaption. IEEE Trans. Mobile Comput. 5, 10, 1417--1431.
[32]
Wood, A. D. and Stankovic, J. A. 2002. Denial of service in sensor networks. IEEE Comput. 35, 54--62.
[33]
Yang, Y., Wang, X., Zhu, S., and Cao, G. 2006. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of the ACM Internation Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).
[34]
Zhu, S., Setia, S., Jajodia, S., and Ning, P. 2004. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy.

Cited By

View all
  • (2025)Towards forward secure verifiable data streaming with support for keyword queryInformation Sciences10.1016/j.ins.2024.121375686(121375)Online publication date: Jan-2025
  • (2024)State Estimation Adaptable to Cyberattack Using a Hardware Programmable Bank of Kalman FiltersIEEE Transactions on Control Systems Technology10.1109/TCST.2024.337899132:5(1730-1742)Online publication date: Sep-2024
  • (2024)PFDAM: Privacy-Preserving Fine-Grained Data Aggregation Scheme Supporting Multifunctionality in Smart GridIEEE Internet of Things Journal10.1109/JIOT.2024.335659311:15(25520-25533)Online publication date: 1-Aug-2024
  • Show More Cited By

Index Terms

  1. Efficient and provably secure aggregation of encrypted data in wireless sensor networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 5, Issue 3
    May 2009
    284 pages
    ISSN:1550-4859
    EISSN:1550-4867
    DOI:10.1145/1525856
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 04 June 2009
    Accepted: 01 September 2008
    Revised: 01 February 2008
    Received: 01 June 2007
    Published in TOSN Volume 5, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. cryptography
    3. privacy
    4. pseudorandom functions
    5. secure data aggregation
    6. stream ciphers
    7. wireless sensor networks

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)58
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Towards forward secure verifiable data streaming with support for keyword queryInformation Sciences10.1016/j.ins.2024.121375686(121375)Online publication date: Jan-2025
    • (2024)State Estimation Adaptable to Cyberattack Using a Hardware Programmable Bank of Kalman FiltersIEEE Transactions on Control Systems Technology10.1109/TCST.2024.337899132:5(1730-1742)Online publication date: Sep-2024
    • (2024)PFDAM: Privacy-Preserving Fine-Grained Data Aggregation Scheme Supporting Multifunctionality in Smart GridIEEE Internet of Things Journal10.1109/JIOT.2024.335659311:15(25520-25533)Online publication date: 1-Aug-2024
    • (2024)Enhanced Blockchain Based Decentralized Public Auditing for Cloud Storage2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00032(107-111)Online publication date: 18-Apr-2024
    • (2024)ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networksJournal of Information Security and Applications10.1016/j.jisa.2024.10384085(103840)Online publication date: Sep-2024
    • (2024)Make your data fair: A survey of data preprocessing techniques that address biases in data towards fair AIJournal of Engineering Research10.1016/j.jer.2024.06.016Online publication date: Jul-2024
    • (2024)Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual dataInformation Sciences10.1016/j.ins.2024.120929677(120929)Online publication date: Aug-2024
    • (2023)A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering SystemsSensors10.3390/s2310474623:10(4746)Online publication date: 14-May-2023
    • (2023)Network life time augmentation of WSN through efficient energy using GAN algorithmJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22344244:5(7073-7082)Online publication date: 1-Jan-2023
    • (2023)HEAR: Homomorphically Encrypted AllreduceProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis10.1145/3581784.3607099(1-17)Online publication date: 12-Nov-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media