Computer Science ›› 2017, Vol. 44 ›› Issue (9): 162-167.doi: 10.11896/j.issn.1002-137X.2017.09.031

Previous Articles     Next Articles

Secure Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

CHEN Yan-li, ZHANG Qian, XU Jian and WANG Meng-han   

  • Online:2018-11-13 Published:2018-11-13

Abstract: To solve the issues of security of multi-source heterogeneous data during data aggregation in wireless sensor networks(WSNs),this paper proposed a lightweight secure data aggregation scheme which can guarantee data confidentiality,integrity and freshness.HASH function is used to update the key of each time slot by using present aggregation round and preset key as an input.The application of homomorphic encryption makes intermediate node perform aggregation operation on ciphertext directly.Homomorphic message authentication code (HMAC) enables base station to verify whether the aggregation data have been modified during transportation.Moreover,plaintext is coded before being encrypted so as to satisfy multiple applications.Theoretical analysis and simulation verify that the proposed algorithm can preserve data privacy with lower communication assumption and higher data aggregation accuracy.

Key words: Secure data aggregation,Homomorphic encryption,Homomorphic message authentication code(HMAC),Multiple applications

[1] XU J,YANG G,CENG Z Y,et al.A survey on the privacy-preserving data aggregation in wireless sensor networks [J].China Communications,2015,12(5):162-180.
[2] SIRSIKAR S,ANAVATTI S.Issues of Data Aggregation Me-thods in Wireless Sensor Network:A Survey [J].Procedia Computer Science,2015,49:194-201.
[3] GAIKWAD P B,DHAGE M R.Survey on Secure Data Aggregation in Wireless Sensor Networks[C]∥Proceedings of the 2015 International Conference on Computing Communication Control and Automation (ICCUBEA).Piscataway,NJ:IEEE,2015:242-246.
[4] ZHOU Q,YANG G,HE L W.An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks [J].International Journal of Distributed Sensor Networks,2014,2014(7):38-50.
[5] CLAUDE C,MYKLETUN E.Efficient and provably secure aggregation of encrypted data in wireless sensor networks [J].ACM Transactions on Sensor Networks,2009,5(3):1137-1153.
[6] WESTHOFF D,GIRAO J,ACHARYA M.Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431.
[7] CHEN C M,LIN Y S,LIN Y C.RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks [J].IEEE Transactions on Parallel and Distributed Systems,2012,23(4):727-734.
[8] VERMA S,PILLAI P,HI Y F.Energy-efficient privacy homomorphic encryption scheme for multi-sensor data in WSNs[C]∥2015 7th International Conference on Communication Systems and Networks (COMSNETS).Piscataway,NJ:IEEE,2015:1-6.
[9] LIU Y S,CHANG S Y,SUN H M.CDAMA:Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks[J].IEEE Transactions on Knowledge & Data Engineering,2013,25(7):1471-1483.
[10] CHEN Z Y.Research on QoS-Oriented Data Collection forWireless Sensor Networks[D].Nanjing:Nanjing University of Posts and Telecommunications,2015.(in Chinese) 陈正宇.面向QoS的无线传感器网络数据收集方法研究[D].南京:南京邮电大学,2015.
[11] HE W B,LIU X,NGUYEN H V.PDA:Privacy-Preserving DataAggregation for Information Collection [J].Acm Transactions on Sensor Networks,2011,8(1):108.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!