A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks
Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs). However, in hostile environments, the aggregated data can be subject to several types of attacks, and provide security is necessary. Recently, sev
- PDF / 1,669,061 Bytes
- 14 Pages / 439.37 x 666.142 pts Page_size
- 77 Downloads / 215 Views
Abstract. Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs). However, in hostile environments, the aggregated data can be subject to several types of attacks, and provide security is necessary. Recently, several secure data aggregation schemes based on homomorphic encryption have been proposed for wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since the aggregator can directly aggregate the ciphertexts without decryption. Based on our survey of existing research for ensuring secure data aggregation in WSNs, an Efficient Secure data aggregation scheme based on fully Homomorphic Encryption (E-SHE), is proposed. This scheme can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), we can also verify data integrity during data aggregation and forwarding processes so that false data can be detected. Our experiments show that E-SHE requires less computation overheads and communication than previously methods and can effectively preserve data integrity, and precise data aggregation rate while consuming less energy to extend network lifetime. Keywords: Wireless sensor networks · Data aggregation · Homomorphic encryption · MAC · Integrity
1
Introduction
Wireless sensor networks consist of a set of devices having limited computing resources. This type of network has attracted much attention in recent years, not only in academia but also in industry, for the study and development of a number of potential applications. However, the resource constraint [1] is the most important feature of this network. Indeed, the wireless sensors are limited in terms of calculation, storage, battery, etc. Therefore, a solution that aims to conserve these resources is widely desired. However, compared to conventional computer networks, implementing security is not easy in wireless sensor networks due to limited processing power, c Springer International Publishing Switzerland 2016 N. Mitton et al. (Eds.): ADHOC-NOW 2016, LNCS 9724, pp. 263–276, 2016. DOI: 10.1007/978-3-319-40509-4 19
264
H. Hayouni and M. Hamdi
storage, bandwidth, and energy of sensor nodes. In addition to security, limited battery power and bandwidth of sensor nodes make it a challenging task to provide efficient solutions to data gathering problem. Therefore, in order to reduce the power and bandwidth consumption of wireless sensor networks, several mechanisms are proposed such as data aggregation [2]. Data aggregation is a technique widely used because it reduces the number of messages transmitted in the network, and therefore reduce energy consumption and improve the life of the network. However, Sensor networks are typically deployed in hostile environments, therefore, the aggregated data are vulnerable to attacks by adversaries, where a compromised sensor node can either illegally report arbitrary values in the result data. Theref
Data Loading...