• DocumentCode
    10584
  • Title

    CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

  • Author

    Yue-Hsun Lin ; Shih-Ying Chang ; Hung-Min Sun

  • Author_Institution
    CyLab, Carnegie Mellon Univ., Pittsburgh, PA, USA
  • Volume
    25
  • Issue
    7
  • fYear
    2013
  • fDate
    Jul-13
  • Firstpage
    1471
  • Lastpage
    1483
  • Abstract
    For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption. Since aggregators collect data without decryption, adversaries are not able to forge aggregated results by compromising them. However, these schemes are not satisfy multi-application environments. Second, these schemes become insecure in case some sensor nodes are compromised. Third, these schemes do not provide secure counting; thus, they may suffer unauthorized aggregation attacks. Therefore, we propose a new concealed data aggregation scheme extended from Boneh et al.´s homomorphic public encryption system. The proposed scheme has three contributions. First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated ciphertexts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. To prove the proposed scheme´s robustness and efficiency, we also conducted the comprehensive analyses and comparisons in the end.
  • Keywords
    cryptography; data privacy; telecommunication security; wireless sensor networks; CDAMA; application-specific data; base station; ciphertext aggregation; concealed data aggregation multiple application scheme; counting security; data encipher; decryption; homomorphic public encryption system; unauthorized aggregation attack; wireless sensor network; Base stations; Elliptic curve cryptography; Tin; Wireless sensor networks; Concealed data aggregation; elliptic curve cryptography; homomorphic encryption; wireless sensor networks;
  • fLanguage
    English
  • Journal_Title
    Knowledge and Data Engineering, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1041-4347
  • Type

    jour

  • DOI
    10.1109/TKDE.2012.94
  • Filename
    6193100