Skip to main content
Log in

A power efficient aggregation of encrypted data in wireless sensor network

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregation will consume much more energy than common nodes and may quit the mission in advance due to energy exhausting because of taxing decryption and re-encryption operation: moreover, it will bring complex key management to ensure the security of the data and corresponding keys. This paper was designed specifically to address above problem based on the thought of privacy homomorphism. It can achieve the perfect security level equal to one-time pad with much lower energy consumption; moreover, it can be proved to resist the attack of node capture. Using the simulation and analysis, we show that our scheme consume the energy only about 21% of AED scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mainwaring A, Polastre J, Szewczyk R,et al. Wireless Sensor Networks for Habitat Monitoring [C]//First ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, IEEE, 2002:88–97.

  2. Juang P, Oki H, Wang Y,et al. Energy-Efficient Computing for Experiences with Zebranet [C]//ASPLOS, San Jose, CA, Oct, 2002:96–107.

  3. Wang H, Elson J, Girod L,et al. Target Classification and Localization in Habitat monitoring [C]//Proc. Of IEEE international Conference on Acoustics, Speech, and Signal Processing, Hong Kong, China, April, 2003:392–401.

  4. Martin F, Mikhak B, Silverman B. MetaCricket: A Designer'S Kit for Making Computational Devices [J].IBM Systems Journal, 2000,39:3–4.

    Article  Google Scholar 

  5. Liu J, Riech J E, Zhao F. Collaborative in-Network Processing for Target Tracking [J].Journal of Applied Signal Processing, 2003,4:378–391.

    Article  Google Scholar 

  6. ARGUS. Advanced Remote Ground Unattended Sensor Systems [EB/OL]. [2006-01-20]http://www.globalsecurity. org/intell/systems/arguss.htm..

  7. Heinzelman W R, Chandrakasan A, Balakrishman H. Energy Efficient Communication Protocol for Wireless Micro Sensor Networks [C]//Proc 33rd Hawaii int'l Conf on System Sciences. Hawaii, USA, HICSS, 2000:1–10.

  8. Manjeshwar A, Agrawal D P. TEEM: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Network [C]//Proc 15th Int'l Parallel and Distributed Procesing Symp (IPDPS'01). San Francisco, USA, April, 2001.

  9. Intanaonwiwat C, Govindan R, Estrin D. Directed Diffusion: A Scalable and Roust Communication Paradigm for Sensor Networks [C]//Proc 6th Annual ACM/IEEE Int'l Conf on Mobile Computing and Networking (MobileCOM'00). Boston, USA, August, 2000.

  10. Perrig R, Szewczyk V. Security Protocols for Sensor Networks [J].Wireless Nets, 2002,8:521–534.

    Article  MATH  Google Scholar 

  11. Eschenauer L, Gligor V D. A Key-Management Scheme for Distributed Sensor Networks [C]//Proceedings of the 9th ACM conference on Computer and communications security. Washington DC, USA, 2002:41–47.

  12. Chan H, Perrig A, Song D. Random Key Pre-Distribution Schemes for Sensor Networks [C]//Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Berkeley, USA, 2003.

  13. Du Wenliang, Deng Jing, Han Y S,et al. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge [C]//Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway, USA, IEEE, 2000:56–73.

  14. Liu D G, Ning P. Location-Based Pairwise Key Establishments for Static Sensor Networks [C]//Proc 1th ACM Workshop on security of ad Hoc and Sensor Networks. Fairfax, USA, 2003:72–82.

  15. Du Wenliang, Deng Jing. A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks [C]// CCS'03. Washington, USA, October 2003.

  16. Blundo C, Santis A D, Herzberg A,et al. Perfectly Secure Key Distribution for Dynamic Conferences [J].Information and Computation, 1998,146(1):1–23.

    Article  MATH  MathSciNet  Google Scholar 

  17. Liu D, Ning P. Establishing Pairwise Keys in Distributed Sensor Networks [C]//Proceedings of the 10th ACM conference on Computer and Communication Security. Washington, USA, October, 2003.

  18. Zhu S, Setia S, Jajodia S. LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks [C]//Proceedings of the 10th ACM conference on Computer and communication security. Washington, USA, October, 2003:62–72.

  19. Sanli H O, Ozdemir S, Cam H. SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks [C]//Proc of IEEE VTC Fall 2004Conference. Los Angeles, USA, Sept, 2004.

  20. Deng Jing, Han R, Mishra S. Security Support For In-Network Processing in Wireless Sensor Networks [C]//First ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN), Fairfax, USA, October, 2003.

  21. Chorzempa M, Park J M, Eltoweissy M. SECK: Survivable and Efficient Clustered Keying for Wireless Sensor Networks [C]//IEEE International Performance, Computing and Communications Conference, Phoenix, USA. April, 2005.

  22. Dimitriou T, Krontiris I. A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks [C]//Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS '05). Denver, USA. April, 2005.

  23. Castelluccia C, Mykletun E, Tsudik G. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks [C]//Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, USA, July, 2005.

  24. Rivest R L, Shamir A, Adleman L M. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems [J].Communications of the ACM, 1978,21(2):120–126.

    Article  MATH  MathSciNet  Google Scholar 

  25. Estrin D.Wireless Sensor Networks, Part IV: Sensor Networks Protocols [R]. Atlanta: ACM, Mobicom, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Ming.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90304015)

Biography: HUANG Xinyang (1979-), male, Ph.D. candidate, research direction: key management; security protocol of wireless network.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xingyang, H., Ming, Y. A power efficient aggregation of encrypted data in wireless sensor network. Wuhan Univ. J. Nat. Sci. 11, 1563–1568 (2006). https://doi.org/10.1007/BF02831821

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831821

Key words

CLC number

Navigation