Title :
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation
Author :
Westhoff, Dirk ; Girao, Joao ; Acharya, Mithun
Author_Institution :
NEC Eur. Ltd., Heidelberg
Abstract :
Routing in wireless sensor networks is different from that in commonsense mobile ad-hoc networks. It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem. To save the overall energy resources of the network, sensed data needs to be consolidated and aggregated on its way to the final destination. We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating intermediate nodes are not required to operate on the sensed plaintext data. We apply a particular class of encryption transformations and discuss techniques for computing the aggregation functions "average" and "movement detection." We show that the approach is feasible for the class of "going down" routing protocols. We consider the risk of corrupted sensor nodes by proposing a key predistribution algorithm that limits an attacker\´s gain and show how key predistribution and a key-ID sensitive "going down" routing protocol help increase the robustness and reliability of the connected backbone
Keywords :
cryptography; multicast communication; routing protocols; telecommunication network reliability; telecommunication traffic; wireless sensor networks; concealed data aggregation; corrupted sensor nodes; encryption transformations; end-to-end encryption; energy resources; in-network data aggregation; key distribution; key-ID sensitive going down routing protocol; movement detection; reverse multicast traffic; routing adaptation; wireless sensor networks; Ad hoc networks; Biomedical monitoring; Cryptography; Intelligent networks; Mobile communication; Robustness; Routing protocols; Spine; Telecommunication traffic; Wireless sensor networks; Wireless sensor networks; data aggregation; data encryption; key predistribution.; privacy homomorphism; robustness and reliability;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2006.144