DocumentCode :
605837
Title :
Energy efficient recoverable concealed data aggregation in wireless sensor networks
Author :
Jose, Jithin ; Manoj Kumar, S. ; Jose, Jithin
Author_Institution :
Dept. Inf. Technol., Karunya Univ., Coimbatore, India
fYear :
2013
fDate :
25-26 March 2013
Firstpage :
322
Lastpage :
329
Abstract :
Concealed data aggregation (CDA) is important in wireless sensor networks, because it provides an energy efficient secure communication by allowing in network data aggregation on encrypted data. Privacy homomorphism (PH) based algorithms are the basis of CDA. However, it supports only a limited number of aggregation functions. Recoverability of individual sensor readings from the concealed data aggregation result at the BS overcomes the limitation of PH based algorithms on aggregation function. Thus, it allows authentication and integrity checking. But this technique reduces the node energy due to the computation overhead of encryption, signature operation as well as the transfer of both. So a mechanism that saves the energy of sensor nodes is required. The proposed technique overcomes this by transmitting the difference data rather than raw data from sensor node to cluster head. This differential data transfer achieves more energy and bandwidth efficiency than the existing recoverable concealed data aggregation scheme. The proposed differential data based recoverable data aggregation scheme increases the network lifetime by avoiding the redundant data transfer from each sensor node. Thus, it reduces the transmission overhead in the secure communication.
Keywords :
cryptography; telecommunication network reliability; telecommunication security; wireless sensor networks; CDA; PH algorithms; aggregation functions; authentication checking; bandwidth efficiency; cluster head; differential data transfer; encryption computation overhead; energy efficient recoverable concealed data aggregation scheme; energy efficient secure communication; integrity checking; network lifetime; privacy homomorphism algorithms; sensor nodes; wireless sensor networks; Ciphers; Encryption; Protocols; Public key; Sensors; Wireless sensor networks; Asymmetric PH; Concealed data aggregation; Data Aggregation; Data authentication; Data integrity; End to end confidentiality; End to end encrypted data aggregation; Privacy homomorphism; Secure data aggregation; Symmetric PH; Wireless Sensor Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on
Conference_Location :
Tirunelveli
Print_ISBN :
978-1-4673-5037-2
Type :
conf
DOI :
10.1109/ICE-CCN.2013.6528517
Filename :
6528517
Link To Document :
بازگشت