Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.

Hdl Handle:
http://hdl.handle.net/10545/622100
Title:
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Authors:
Cui, Jie ( 0000-0001-7258-3418 ) ; Shao, Lili; Zhong, Hong ( 0000-0002-0392-9734 ) ; Xu, Yan; Liu, Lu ( 0000-0003-1013-4507 )
Abstract:
In wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.
Affiliation:
Anhui University; University of Derby
Citation:
Cui, J. et al (2017) 'Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks', Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-017-0581-5
Publisher:
Springer
Journal:
Peer-to-Peer Networking and Applications
Issue Date:
17-Jul-2017
URI:
http://hdl.handle.net/10545/622100
DOI:
10.1007/s12083-017-0581-5
Additional Links:
http://link.springer.com/10.1007/s12083-017-0581-5
Type:
Article
Language:
en
ISSN:
19366442
EISSN:
19366450
Sponsors:
N/A
Appears in Collections:
Department of Electronics, Computing & Maths

Full metadata record

DC FieldValue Language
dc.contributor.authorCui, Jieen
dc.contributor.authorShao, Lilien
dc.contributor.authorZhong, Hongen
dc.contributor.authorXu, Yanen
dc.contributor.authorLiu, Luen
dc.date.accessioned2018-01-30T12:50:28Z-
dc.date.available2018-01-30T12:50:28Z-
dc.date.issued2017-07-17-
dc.identifier.citationCui, J. et al (2017) 'Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks', Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-017-0581-5en
dc.identifier.issn19366442-
dc.identifier.doi10.1007/s12083-017-0581-5-
dc.identifier.urihttp://hdl.handle.net/10545/622100-
dc.description.abstractIn wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.en
dc.description.sponsorshipN/Aen
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttp://link.springer.com/10.1007/s12083-017-0581-5en
dc.rightsArchived with thanks to Peer-to-Peer Networking and Applicationsen
dc.subjectData aggregationen
dc.subjectConfidentialityen
dc.subjectIntegrityen
dc.subjectHomomorphic encryptionen
dc.titleData aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.en
dc.typeArticleen
dc.identifier.eissn19366450-
dc.contributor.departmentAnhui Universityen
dc.contributor.departmentUniversity of Derbyen
dc.identifier.journalPeer-to-Peer Networking and Applicationsen
All Items in UDORA are protected by copyright, with all rights reserved, unless otherwise indicated.