Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey
Автор: Josna Jose, Joyce Jose
Журнал: International Journal of Information Technology and Computer Science(IJITCS) @ijitcs
Статья в выпуске: 5 Vol. 6, 2014 года.
Бесплатный доступ
The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained WSNs. Concealed Data Aggregation (CDA) based on privacy homomorphism (PH) gives a critical solution for energy efficient secure data aggregation in WSNs. PH based algorithms allow aggregation to be happened on cipher texts. Thus, it eliminates the power consuming decryption operations at the aggregator node for the data aggregation and further encryption for the secure transmission of aggregated data. It also avoids the aggregator node from the burden of keeping the secret key information and thereby it achieves energy efficiency and reduces the frequency of node compromise attacks in aggregator nodes. Among the CDA techniques, asymmetric PH based CDA techniques are exploring due to their combination with elliptic curve cryptography having reduced key size. We present an overview of asymmetric concealed data aggregation techniques that achieve both end to end data confidentiality and non delayed data aggregation.
Wireless Sensor Network, Data Aggregation, Secure Data Aggregation, Concealed Data Aggregation, End to End Encrypted Data Aggregation, Privacy Homomorphism
Короткий адрес: https://sciup.org/15012078
IDR: 15012078
Список литературы Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey
- Kiran Maraiya, Kamal Kant, Nitin Gupta. Wireless Sensor Network: A Review on Data Aggregation. International Journal of Scientific & Engineering Research, Vol. 2, Issue 4, April -2011, ISSN 2229-5518.
- Nandini. S. Patil, Prof. P. R. Patil. Data Aggregation in Wireless Sensor Network. IEEE International Conference on Computational Intelligence and Computing Research, 2010.
- P.D.Patel, Porf.P.B. Lapsiwala and R.V.Kshirsagar. Data Aggregation in Wireless Sensor Network, International Journal of Management, IT and Engineering, Vol. 2, Issue 7, July 2012, ISSN: 2249-0558.
- S.Ozdemir, Y.Xiao. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks,Vol. 53, 2009, 2022–2037.
- Y.Sang and H Shen, Secure Data Aggregation in Wireless Sensor Networks: A Survey. Proc. IEEE Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT ’06), December 2006, pp.315-320.
- Mukesh Kumar Jha,T.P. Sharma. Secure Data aggregation in Wireless Sensor Network: A Survey. International Journal of Engineering Science and Technology, Vol. 3, No. 3 March 2011, ISSN: 0975-5462.
- D.Westhoff,J.Girao and A.Sarma. Security Solutions for Wireless Sensor Networks. NEC TECHNICAL JOURNAL, Vol.1, No.3, 2006.
- Gwoboa Horng, Chien-Lung Wang, Tzung-Her Chen. "An Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks". Information Security and Cryptology Conference (ISCTurkey 2007), Ankara, Turkey, Dec. 13-14, 2007.
- S. Ozdemir. Concealed Data Aggregation in Heterogeneous Sensor Networks Using Privacy Homomorphism. Proc. IEEE Int’l Conf. Pervasive Services, July 2007, pp. 165-168.
- C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems, July 2005, pp. 109-117.
- Suat Ozdemir and Yang Xiao. Hierarchical concealed data aggregation for wireless sensor networks. In: Proceedings of the Embedded Systems and Communications Security Workshop in conjunction with IEEE (SRDS 2009), 2009.
- Julia Albath and Sanjay Madria. Secure hierarchical data aggregation in wireless sensor networks. In: Proceedings of the, IEEE conference on Wireless Communications and Networking( WCNC 2009), 2009.
- Vivaksha Jariwala and Devesh Jinwala, A NOVEL APPROACH FOR SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS. 10th National Workshop on Cryptology, Department of Mathematics and Computer Applications, PSG College of Technology, Peelamedu, Coimbatore, September 2 – 4, 2010.
- Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012.
- Hung-Min Sun, Chien-Ming Chen, Yue-Hsun Lin, and Ya-Ching Lin. Supplementary Material: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. SUPPLEMENTAL MATERIAL FOR THE IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, available on http://doi.ieeecomputersociety.org/10.1109/TPDS. 2011.219.
- E. Mykletun, J. Girao, and D. Westhoff. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks. Proc. IEEE Int’l Conf. Comm., vol. 5, June 2006, pp. 2288-2295.
- D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), 2003, pp. 416-432.
- O.Ugus, A.Hessler, D.Westhoff. “Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS”. Technical Report, 6, Fachgesprach “Drahtlose Sensornetze”, July 2007, http://www.ist-ubisecsens.org/publications/EcElGamal-UgHesWest.pdf.
- P. Paillier. Trapdooring Discrete Logarithms on Elliptic Curves over Rings. Proc. Ann. Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT ’00), 2000, pp. 573-584.
- P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’99), 1999, pp. 223-238.
- J. Benaloh. Dense Probabilistic Encryption, Proc. Workshop Selected Areas of Cryptography (SAC ’94), pp. 120-128, 1994.
- D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. Proc. ACM Conf. Computer and Comm. Security (CCS ’98), 1998, pp. 59-66.
- T. Okamoto and S. Uchiyama. A New Public-Key Cryptosystem as Secure as Factoring. Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’98), 1998, pp. 308-318.
- T. ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Proc. Ann. Int’l Cryptology Conf. (CRYPTO ’85), vol. 31, no. 4, July 1985, pp. 469-472.
- Dr.G.Padmavathi, Mrs.D.Shanmugapriya. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security, Vol. 4,No. 1&2, 2009.
- S. Peter, D. Westhoff, and C. Castelluccia. A Survey on the Encryption of Convergecast-Traffic with In-Network Processing. IEEE Transactions on Dependable and Secure Computing, vol. 7,No.1, Januvary-March,2010.
- Josna Jose, Joyce Jose and Fijo Jose. A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks. International Journal of Computer Applications (0975 – 8887), Volume 55,No.18, October 2012.
- D. Westhoff, J. Girao, and M. Acharya. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation, IEEE Trans. Mobile Computing, vol. 5, no. 10, Oct. 2006pp. 1417-1431.