Computer Science ›› 2017, Vol. 44 ›› Issue (9): 162-167.doi: 10.11896/j.issn.1002-137X.2017.09.031

Previous Articles     Next Articles

Secure Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks

CHEN Yan-li, ZHANG Qian, XU Jian and WANG Meng-han   

  • Online:2018-11-13 Published:2018-11-13

Abstract: To solve the issues of security of multi-source heterogeneous data during data aggregation in wireless sensor networks(WSNs),this paper proposed a lightweight secure data aggregation scheme which can guarantee data confidentiality,integrity and freshness.HASH function is used to update the key of each time slot by using present aggregation round and preset key as an input.The application of homomorphic encryption makes intermediate node perform aggregation operation on ciphertext directly.Homomorphic message authentication code (HMAC) enables base station to verify whether the aggregation data have been modified during transportation.Moreover,plaintext is coded before being encrypted so as to satisfy multiple applications.Theoretical analysis and simulation verify that the proposed algorithm can preserve data privacy with lower communication assumption and higher data aggregation accuracy.

Key words: Secure data aggregation,Homomorphic encryption,Homomorphic message authentication code(HMAC),Multiple applications

[1] XU J,YANG G,CENG Z Y,et al.A survey on the privacy-preserving data aggregation in wireless sensor networks [J].China Communications,2015,12(5):162-180.
[2] SIRSIKAR S,ANAVATTI S.Issues of Data Aggregation Me-thods in Wireless Sensor Network:A Survey [J].Procedia Computer Science,2015,49:194-201.
[3] GAIKWAD P B,DHAGE M R.Survey on Secure Data Aggregation in Wireless Sensor Networks[C]∥Proceedings of the 2015 International Conference on Computing Communication Control and Automation (ICCUBEA).Piscataway,NJ:IEEE,2015:242-246.
[4] ZHOU Q,YANG G,HE L W.An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks [J].International Journal of Distributed Sensor Networks,2014,2014(7):38-50.
[5] CLAUDE C,MYKLETUN E.Efficient and provably secure aggregation of encrypted data in wireless sensor networks [J].ACM Transactions on Sensor Networks,2009,5(3):1137-1153.
[6] WESTHOFF D,GIRAO J,ACHARYA M.Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431.
[7] CHEN C M,LIN Y S,LIN Y C.RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks [J].IEEE Transactions on Parallel and Distributed Systems,2012,23(4):727-734.
[8] VERMA S,PILLAI P,HI Y F.Energy-efficient privacy homomorphic encryption scheme for multi-sensor data in WSNs[C]∥2015 7th International Conference on Communication Systems and Networks (COMSNETS).Piscataway,NJ:IEEE,2015:1-6.
[9] LIU Y S,CHANG S Y,SUN H M.CDAMA:Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks[J].IEEE Transactions on Knowledge & Data Engineering,2013,25(7):1471-1483.
[10] CHEN Z Y.Research on QoS-Oriented Data Collection forWireless Sensor Networks[D].Nanjing:Nanjing University of Posts and Telecommunications,2015.(in Chinese) 陈正宇.面向QoS的无线传感器网络数据收集方法研究[D].南京:南京邮电大学,2015.
[11] HE W B,LIU X,NGUYEN H V.PDA:Privacy-Preserving DataAggregation for Information Collection [J].Acm Transactions on Sensor Networks,2011,8(1):108.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .