|
|
A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks |
Ding Chao① Yang Li-jun① Wu Meng②③ |
①(College of Computer Science & Technology, Nanjing University of Posts and Telecommunication, Nanjing 210003, China)
②(College of Telecommunication & Information Engineering, Nanjing University of Posts and Telecommunication, Nanjing 210003, China)
③(Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education, Nanjing 210003, China) |
|
|
Abstract To address the contradiction between data aggregation and data security in Wireless Sensor Networks (WSNs), a recoverable privacy-preserving integrity-assured data aggregation scheme is proposed based on the technologies of privacy homomorphism and aggregate message authentication code. The proposed scheme enables the Base Station (BS) to recover all the original sensing data from the final aggregated results, which makes it possible to verify the integrity of each sensing data and aggregated data, and perform any further operations on them on demand. The security analysis shows that the proposal not only provides the data privacy and data integrity, but also resists against unauthorized aggregation attack and aggregator capture attack; besides, it is able to detect and locate the malicious nodes which injects false data to the network in a certain range. The performance analysis shows that the proposed scheme has remarkable advantages over existing schemes in terms of computation and communication overhead. In order to evaluate the performance and feasibility of the proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate the proposed scheme is feasible and efficient for resource-constrained WSNs.
|
Received: 05 February 2015
Published: 01 November 2015
|
|
Fund: The National 973 Program of China (2011CB302903); The National Natural Science Foundation of China (61100213); The Specialized Research Fund for the Doctoral Program of Higher Education of China (20113223120007); The Key Program of Natural Science for Universities of Jiangsu Province (10KJA510035) |
Corresponding Authors:
Wu Meng
E-mail: wum@njupt.edu.cn
|
|
|
|
[1] |
Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of 5th IEEE International Conference on Communications (ICC’05), Seoul, Korea, 2005: 3044-3049.
|
[2] |
Lin Y H, Chang S Y, and Sun H M. CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(7): 1471-1483.
|
[3] |
Mykletun E, Girao J, and Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks[C]. Proceedings of 6th International Conference on Communication (ICC’06), Istanbul, Turkey, 2006: 2288-2295.
|
[4] |
Taeho J, Mao X F, Li X Y, et al.. Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation[C]. Proceedings of 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, 2013: 2634-2642.
|
[5] |
Yang Y, Wang X, Zhu S, et al.. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information System Security, 2008, 11(4): 1-43.
|
[6] |
Zhu L, Yang Z, Li M, et al.. An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7): 718-720.
|
[7] |
Niu S, Wang C, Yu Z, et al.. Lossy data aggregation integrity scheme in wireless sensor networks[J]. Computers & Electrical Engineering, 2013, 39(6): 1726-1735.
|
[8] |
OzeDemir S and Cam H. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 736-749.
|
[9] |
赵小敏, 梁学利, 蒋双双, 等. 安全的WSN数据融合隐私保护方案设计[J]. 通信学报, 2014, 35(11): 154-161.
|
|
Zhao Xiao-min, Liang Xue-li, Jiang Shuang-shuang, et al.. Design of secure privacy-preserving data aggregation scheme for wireless sensor network[J]. Journal on Communications, 2014, 35(11): 154-161.
|
[10] |
Sun H, Chen C, and Lin Y. RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(4): 727-734.
|
[11] |
Ozdemir S and Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011, 55(8): 1735-1746.
|
[12] |
Zhou Q, Yang G, and He L. A secure-enhanced data aggregation based on ECC in wireless sensor networks[J]. Sensors (Basel, Switzerland), 2014, 14(4): 6701-6721.
|
[13] |
Papadopoulos S, Kiayias A, and Papadias D. Exact in-network aggregation with integrity and confidentiality[J]. IEEE Transactions on Knowledge & Data Engineering, 2012, 24(10): 1760-1773.
|
[14] |
Katz J and Lindell A. Aggregate message authentication codes[C]. Proceedings of the Cryptographers’ Track at the RSA Conference, San Francisco, CA, USA, 2008: 155-169.
|
[15] |
Rivest R, Adleman L, and Dertouzos M. Foundations of Secure Computation[M]. Academia Press, 1978: 169-179.
|
[16] |
Peter S, Westhoff D, and Castelluccia C. A survey on the encryption of convergecast traffic with in-network processing[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34.
|
[17] |
Aranha D F. RELIC Cryptographic Toolkit[EB/OL]. http://code.google.com/p/relic-toolkit, 2009.
|
|
|
|