Hybrid Secure Data Aggregation in Wireless Sensor Networks

  • Keyur ParmarEmail author
  • Devesh C. Jinwala
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9361)


Secure data aggregation aims at combining security and data aggregation together to meet the requirements of data-centric networks such as wireless sensor network. Secure data aggregation protocols provide either hop-by-hop security or end-to-end security. However, hop-by-hop secure data aggregation is vulnerable to attackers at intermediate nodes while end-to-end secure data aggregation increases the communication overhead. In this paper, we propose a hybrid secure data aggregation protocol to balance the trade-off between privacy and communication overhead. The proposed protocol uses the symmetric-key based privacy homomorphism to ensure the privacy of sensor readings at intermediate nodes. In addition, the proposed protocol efficiently deals with the key management issues that exist in the state-of-the-art symmetric-key based protocols. The proposed protocol also reduces the communication overhead as compared to the existing end-to-end secure data aggregation protocols. Comprehensive analysis and comparisons validate the viability of the proposed protocol in resource-constrained wireless sensor networks.


Wireless sensor networks Security Secure data aggregation Privacy homomorphism Communication overhead 



This research was a part of the project “A Secure Data Aggregation System and An Intrusion Detection System for Wireless Sensor Networks”. It was supported by the Department of Electronics and Information Technology, Ministry of Communications and Information Technology, Government of India.


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 38(4), 393–422 (2002)Google Scholar
  2. 2.
    Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 5(3), 20:1–20:36 (2009)Google Scholar
  3. 3.
    Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2005, pp. 109–117. IEEE, Washington, D.C., July 2005Google Scholar
  4. 4.
    Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)CrossRefGoogle Scholar
  5. 5.
    Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002) CrossRefGoogle Scholar
  6. 6.
    Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. Wirel. Commun. 14(2), 70–87 (2007)CrossRefGoogle Scholar
  7. 7.
    Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS: tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Netw. 5(7), 1073–1089 (2007)CrossRefGoogle Scholar
  8. 8.
    Girao, J., Westhoff, D., Schneider, M.: CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proceedings of the 40th International Conference on Communications, ICC 2005, pp. 3044–3049. IEEE, Seoul, May 2005Google Scholar
  9. 9.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  10. 10.
    Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography, 1st edn. Springer, Secaucus (2003) Google Scholar
  11. 11.
    Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. ACM SIGPLAN Not. 35(11), 93–104 (2000)CrossRefGoogle Scholar
  12. 12.
    Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Symposium on Applications and the Internet Workshops, SAINT 2003, pp. 384–391. IEEE, Washington, D.C., January 2003Google Scholar
  13. 13.
    Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: an operating system for sensor networks. In: Weber, W., Rabaey, J.M., Aarts, E. (eds.) Ambient Intelligence, pp. 115–148. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2004, pp. 71–80. IEEE, Santa Clara, October 2004Google Scholar
  16. 16.
    Mlaih, E., Aly, S.A.: Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks. In: Proceedings of the 2nd IEEE Workshop on Mission Critical Networking in Conjunction with Infocom 2008, MCN 2008, pp. 1–6. IEEE, Phoenix, April 2008Google Scholar
  17. 17.
    Mykletun, E., Girao, J., Westhoff, D.: Public key based cryptoschemes for data concealment in wireless sensor networks. In: Proceedings of the IEEE International Conference on Communications, ICC 2006, pp. 2288–2295. IEEE, Istanbul, June 2006Google Scholar
  18. 18.
    Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. Int. J. Comput. Telecommun. Netw. 53(12), 2022–2037 (2009)zbMATHGoogle Scholar
  19. 19.
    Parmar, K., Jinwala, D.C.: Malleability resilient concealed data aggregation. In: Kermarrec, Y. (ed.) EUNICE 2014. LNCS, vol. 8846, pp. 160–172. Springer, Heidelberg (2014)Google Scholar
  20. 20.
    Parmar, K., Jinwala, D.C.: Symmetric-key based homomorphic primitives for end-to-end secure data aggregation in wireless sensor networks. J. Inf. Secur. 6(1), 38–50 (2015)CrossRefGoogle Scholar
  21. 21.
    Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for WSNs. In: Proceedings of the 4th IEEE Consumer Communications Networking Conference, CCNC 2007, pp. 192–196. IEEE, Las Vegas, January 2007Google Scholar
  22. 22.
    Peter, S., Westhoff, D., Castelluccia, C.: A survey on the encryption of convergecast traffic with in-network processing. IEEE Trans. Dependable Secure Comput. 7(1), 20–34 (2010)CrossRefGoogle Scholar
  23. 23.
    Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNetGoogle Scholar
  24. 24.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)CrossRefGoogle Scholar
  26. 26.
    Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Trans. Mob. Comput. 5(10), 1417–1431 (2006)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.S.V. National Institute of TechnologySuratIndia

Personalised recommendations