Show simple item record

dc.contributor.authorCui, Jie
dc.contributor.authorShao, Lili
dc.contributor.authorZhong, Hong
dc.contributor.authorXu, Yan
dc.contributor.authorLiu, Lu
dc.date.accessioned2018-01-30T12:50:28Z
dc.date.available2018-01-30T12:50:28Z
dc.date.issued2017-07-17
dc.identifier.citationCui, J. et al (2017) 'Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks', Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-017-0581-5en
dc.identifier.issn19366442
dc.identifier.doi10.1007/s12083-017-0581-5
dc.identifier.urihttp://hdl.handle.net/10545/622100
dc.description.abstractIn wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.
dc.description.sponsorshipN/Aen
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttp://link.springer.com/10.1007/s12083-017-0581-5en
dc.rightsArchived with thanks to Peer-to-Peer Networking and Applicationsen
dc.subjectData aggregationen
dc.subjectConfidentialityen
dc.subjectIntegrityen
dc.subjectHomomorphic encryptionen
dc.titleData aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.en
dc.typeArticleen
dc.identifier.eissn19366450
dc.contributor.departmentAnhui Universityen
dc.contributor.departmentUniversity of Derbyen
dc.identifier.journalPeer-to-Peer Networking and Applicationsen
refterms.dateFOA2019-02-28T16:32:37Z
html.description.abstractIn wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless sensor networks. In current studies, Elliptic Curve ElGamal homomorphic encryption algorithm has been widely used to protect end-to-end data confidentiality. However, these works suffer from the expensive mapping function during decryption. If the aggregated results are huge, the base station has no way to gain the original data due to the hardness of the elliptic curve discrete logarithm problem. Therefore, these schemes are unsuitable for the large-scale WSNs. In this paper, we propose a secure energy-saving data aggregation scheme designed for the large-scale WSNs. We employ Okamoto-Uchiyama homomorphic encryption algorithm to protect end-to-end data confidentiality, use MAC to achieve in-network false data filtering, and utilize the homomorphic MAC algorithm to achieve end-to-end data integrity. Two popular IEEE 802.15.4-compliant wireless sensor network platforms, Tmote Sky and iMote 2 have been used to evaluate the efficiency and feasibility of our scheme. The results demonstrate that our scheme achieved better performance in reducing energy consumption. Moreover, system delay, especially decryption delay at the base station, has been reduced when compared to other state-of-art methods.


Files in this item

Thumbnail
Name:
Data aggregation with end-to-end ...
Size:
1.730Mb
Format:
PDF
Description:
Published PDF (Open Access CCBY)

This item appears in the following Collection(s)

Show simple item record