• DocumentCode
    3526538
  • Title

    Perfectly anonymous data aggregation in wireless sensor networks

  • Author

    Buttyán, Levente ; Holczer, Tamás

  • Author_Institution
    Lab. of Cryptography & Syst. Security (CrySyS), Budapest Univ. of Technol. & Econ., Budapest, Hungary
  • fYear
    2010
  • fDate
    8-12 Nov. 2010
  • Firstpage
    513
  • Lastpage
    518
  • Abstract
    Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some security issues; in particular, aggregator nodes become attractive targets of physical destruction and jamming attacks. In order to mitigate this problem, we propose a new private aggregator node election protocol that hides the identity of the elected aggregator nodes both from external eavesdroppers and from compromised nodes participating in the protocol. We also propose a private data aggregation protocol and a corresponding private query protocol which allows the aggregators to collect sensor readings and respond to queries of the base station, respectively, without revealing any useful information about their identity to external eavesdroppers and to compromised nodes.
  • Keywords
    cryptographic protocols; jamming; pattern clustering; private key cryptography; telecommunication security; wireless sensor networks; data aggregation; data clustering; eavesdropper; jamming attack; private aggregator node election protocol; private query protocol; security issue; wireless sensor networks; Authentication; Base stations; Digital signatures; Nominations and elections; Protocols; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on
  • Conference_Location
    San Francisco, CA
  • ISSN
    2155-6806
  • Print_ISBN
    978-1-4244-7488-2
  • Type

    conf

  • DOI
    10.1109/MASS.2010.5663911
  • Filename
    5663911