Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey

Full Text (PDF, 252KB), PP.28-35

Views: 0 Downloads: 0

Author(s)

Josna Jose 1,* Joyce Jose 2

1. Dept. Computer Science and Engineering, Cochin University of Science and Technology, Kochi, India

2. Dept. Computer Science and Engineering, Cochin University of Science and Technology, Kochi, Kerala, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2014.05.04

Received: 20 Jun. 2013 / Revised: 3 Oct. 2013 / Accepted: 20 Dec. 2013 / Published: 8 Apr. 2014

Index Terms

Wireless Sensor Network, Data Aggregation, Secure Data Aggregation, Concealed Data Aggregation, End to End Encrypted Data Aggregation, Privacy Homomorphism

Abstract

The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained WSNs. Concealed Data Aggregation (CDA) based on privacy homomorphism (PH) gives a critical solution for energy efficient secure data aggregation in WSNs. PH based algorithms allow aggregation to be happened on cipher texts. Thus, it eliminates the power consuming decryption operations at the aggregator node for the data aggregation and further encryption for the secure transmission of aggregated data. It also avoids the aggregator node from the burden of keeping the secret key information and thereby it achieves energy efficiency and reduces the frequency of node compromise attacks in aggregator nodes. Among the CDA techniques, asymmetric PH based CDA techniques are exploring due to their combination with elliptic curve cryptography having reduced key size. We present an overview of asymmetric concealed data aggregation techniques that achieve both end to end data confidentiality and non delayed data aggregation.

Cite This Paper

Josna Jose, Joyce Jose, "Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.5, pp.28-35, 2014. DOI:10.5815/ijitcs.2014.05.04

Reference

[1]Kiran Maraiya, Kamal Kant, Nitin Gupta. Wireless Sensor Network: A Review on Data Aggregation. International Journal of Scientific & Engineering Research, Vol. 2, Issue 4, April -2011, ISSN 2229-5518. 

[2]Nandini. S. Patil, Prof. P. R. Patil. Data Aggregation in Wireless Sensor Network. IEEE International Conference on Computational Intelligence and Computing Research, 2010.

[3]P.D.Patel, Porf.P.B. Lapsiwala and R.V.Kshirsagar. Data Aggregation in Wireless Sensor Network, International Journal of Management, IT and Engineering, Vol. 2, Issue 7, July 2012, ISSN: 2249-0558.

[4]S.Ozdemir, Y.Xiao. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks,Vol. 53, 2009, 2022–2037.

[5]Y.Sang and H Shen, Secure Data Aggregation in Wireless Sensor Networks: A Survey. Proc. IEEE Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT ’06), December 2006, pp.315-320.

[6]Mukesh Kumar Jha,T.P. Sharma. Secure Data aggregation in Wireless Sensor Network: A Survey. International Journal of Engineering Science and Technology, Vol. 3, No. 3 March 2011, ISSN: 0975-5462.

[7]D.Westhoff,J.Girao and A.Sarma. Security Solutions for Wireless Sensor Networks. NEC TECHNICAL JOURNAL, Vol.1, No.3, 2006.

[8]Gwoboa Horng, Chien-Lung Wang, Tzung-Her Chen. "An Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks". Information Security and Cryptology Conference (ISCTurkey 2007), Ankara, Turkey, Dec. 13-14, 2007.

[9]S. Ozdemir. Concealed Data Aggregation in Heterogeneous Sensor Networks Using Privacy Homomorphism. Proc. IEEE Int’l Conf. Pervasive Services, July 2007, pp. 165-168.

[10]C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems, July 2005, pp. 109-117.

[11]Suat Ozdemir and Yang Xiao. Hierarchical concealed data aggregation for wireless sensor networks. In: Proceedings of the Embedded Systems and Communications Security Workshop in conjunction with IEEE (SRDS 2009), 2009.

[12]Julia Albath and Sanjay Madria. Secure hierarchical data aggregation in wireless sensor networks. In: Proceedings of the, IEEE conference on Wireless Communications and Networking( WCNC 2009), 2009. 

[13]Vivaksha Jariwala and Devesh Jinwala, A NOVEL APPROACH FOR SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS. 10th National Workshop on Cryptology, Department of Mathematics and Computer Applications, PSG College of Technology, Peelamedu, Coimbatore, September 2 – 4, 2010.

[14]Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012.

[15]Hung-Min Sun, Chien-Ming Chen, Yue-Hsun Lin, and Ya-Ching Lin. Supplementary Material: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. SUPPLEMENTAL MATERIAL FOR THE IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, available on http://doi.ieeecomputersociety.org/10.1109/TPDS. 2011.219.

[16]E. Mykletun, J. Girao, and D. Westhoff. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks. Proc. IEEE Int’l Conf. Comm., vol. 5, June 2006, pp. 2288-2295.

[17]D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), 2003, pp. 416-432.

[18]O.Ugus, A.Hessler, D.Westhoff. “Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS”. Technical Report, 6, Fachgesprach “Drahtlose Sensornetze”, July 2007, http://www.ist-ubisecsens.org/publications/EcElGamal-UgHesWest.pdf.

[19]P. Paillier. Trapdooring Discrete Logarithms on Elliptic Curves over Rings. Proc. Ann. Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT ’00), 2000, pp. 573-584.

[20]P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’99), 1999, pp. 223-238.

[21]J. Benaloh. Dense Probabilistic Encryption, Proc. Workshop Selected Areas of Cryptography (SAC ’94), pp. 120-128, 1994.

[22]D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. Proc. ACM Conf. Computer and Comm. Security (CCS ’98), 1998, pp. 59-66. 

[23]T. Okamoto and S. Uchiyama. A New Public-Key Cryptosystem as Secure as Factoring. Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’98), 1998, pp. 308-318.

[24]T. ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Proc. Ann. Int’l Cryptology Conf. (CRYPTO ’85), vol. 31, no. 4, July 1985, pp. 469-472.

[25]Dr.G.Padmavathi, Mrs.D.Shanmugapriya. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security, Vol. 4,No. 1&2, 2009.

[26]S. Peter, D. Westhoff, and C. Castelluccia. A Survey on the Encryption of Convergecast-Traffic with In-Network Processing. IEEE Transactions on Dependable and Secure Computing, vol. 7,No.1, Januvary-March,2010.

[27]Josna Jose, Joyce Jose and Fijo Jose. A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks. International Journal of Computer Applications (0975 – 8887), Volume 55,No.18, October 2012.

[28]D. Westhoff, J. Girao, and M. Acharya. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation, IEEE Trans. Mobile Computing, vol. 5, no. 10, Oct. 2006pp. 1417-1431.