Skip to main content

Hybrid Secure Data Aggregation in Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9361))

Abstract

Secure data aggregation aims at combining security and data aggregation together to meet the requirements of data-centric networks such as wireless sensor network. Secure data aggregation protocols provide either hop-by-hop security or end-to-end security. However, hop-by-hop secure data aggregation is vulnerable to attackers at intermediate nodes while end-to-end secure data aggregation increases the communication overhead. In this paper, we propose a hybrid secure data aggregation protocol to balance the trade-off between privacy and communication overhead. The proposed protocol uses the symmetric-key based privacy homomorphism to ensure the privacy of sensor readings at intermediate nodes. In addition, the proposed protocol efficiently deals with the key management issues that exist in the state-of-the-art symmetric-key based protocols. The proposed protocol also reduces the communication overhead as compared to the existing end-to-end secure data aggregation protocols. Comprehensive analysis and comparisons validate the viability of the proposed protocol in resource-constrained wireless sensor networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 38(4), 393–422 (2002)

    Google Scholar 

  2. Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 5(3), 20:1–20:36 (2009)

    Google Scholar 

  3. Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2005, pp. 109–117. IEEE, Washington, D.C., July 2005

    Google Scholar 

  4. Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)

    Article  Google Scholar 

  5. Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. Wirel. Commun. 14(2), 70–87 (2007)

    Article  Google Scholar 

  7. Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS: tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Netw. 5(7), 1073–1089 (2007)

    Article  Google Scholar 

  8. Girao, J., Westhoff, D., Schneider, M.: CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proceedings of the 40th International Conference on Communications, ICC 2005, pp. 3044–3049. IEEE, Seoul, May 2005

    Google Scholar 

  9. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography, 1st edn. Springer, Secaucus (2003)

    Google Scholar 

  11. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. ACM SIGPLAN Not. 35(11), 93–104 (2000)

    Article  Google Scholar 

  12. Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Symposium on Applications and the Internet Workshops, SAINT 2003, pp. 384–391. IEEE, Washington, D.C., January 2003

    Google Scholar 

  13. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  14. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: an operating system for sensor networks. In: Weber, W., Rabaey, J.M., Aarts, E. (eds.) Ambient Intelligence, pp. 115–148. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2004, pp. 71–80. IEEE, Santa Clara, October 2004

    Google Scholar 

  16. Mlaih, E., Aly, S.A.: Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks. In: Proceedings of the 2nd IEEE Workshop on Mission Critical Networking in Conjunction with Infocom 2008, MCN 2008, pp. 1–6. IEEE, Phoenix, April 2008

    Google Scholar 

  17. Mykletun, E., Girao, J., Westhoff, D.: Public key based cryptoschemes for data concealment in wireless sensor networks. In: Proceedings of the IEEE International Conference on Communications, ICC 2006, pp. 2288–2295. IEEE, Istanbul, June 2006

    Google Scholar 

  18. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. Int. J. Comput. Telecommun. Netw. 53(12), 2022–2037 (2009)

    MATH  Google Scholar 

  19. Parmar, K., Jinwala, D.C.: Malleability resilient concealed data aggregation. In: Kermarrec, Y. (ed.) EUNICE 2014. LNCS, vol. 8846, pp. 160–172. Springer, Heidelberg (2014)

    Google Scholar 

  20. Parmar, K., Jinwala, D.C.: Symmetric-key based homomorphic primitives for end-to-end secure data aggregation in wireless sensor networks. J. Inf. Secur. 6(1), 38–50 (2015)

    Article  Google Scholar 

  21. Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for WSNs. In: Proceedings of the 4th IEEE Consumer Communications Networking Conference, CCNC 2007, pp. 192–196. IEEE, Las Vegas, January 2007

    Google Scholar 

  22. Peter, S., Westhoff, D., Castelluccia, C.: A survey on the encryption of convergecast traffic with in-network processing. IEEE Trans. Dependable Secure Comput. 7(1), 20–34 (2010)

    Article  Google Scholar 

  23. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)

    MathSciNet  Google Scholar 

  24. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  25. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)

    Article  Google Scholar 

  26. Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Trans. Mob. Comput. 5(10), 1417–1431 (2006)

    Article  Google Scholar 

Download references

Acknowledgments

This research was a part of the project “A Secure Data Aggregation System and An Intrusion Detection System for Wireless Sensor Networks”. It was supported by the Department of Electronics and Information Technology, Ministry of Communications and Information Technology, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keyur Parmar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Parmar, K., Jinwala, D.C. (2015). Hybrid Secure Data Aggregation in Wireless Sensor Networks. In: Mousavi, M., Berger, C. (eds) Cyber Physical Systems. Design, Modeling, and Evaluation. CyPhy 2015. Lecture Notes in Computer Science(), vol 9361. Springer, Cham. https://doi.org/10.1007/978-3-319-25141-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25141-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25140-0

  • Online ISBN: 978-3-319-25141-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics