Share This Article:

Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks

Abstract Full-Text HTML XML Download Download as PDF (Size:3484KB) PP. 38-50
DOI: 10.4236/jis.2015.61005    2,827 Downloads   3,708 Views   Citations

ABSTRACT

In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route aggregation. However, the use of inherently malleable privacy homomorphism makes these protocols vulnerable to active attackers. In this paper, we propose an integrity and privacy preserving end-to-end secure data aggregation protocol. We use symmetric key-based homomorphic primitives to provide end-to-end privacy and end-to-end integrity of reverse multicast traffic. As sensor network has a non-replenishable energy supply, the use of symmetric key based homomorphic primitives improves the energy efficiency and increase the sensor network’s lifetime. We comparatively evaluate the performance of the proposed protocol to show its efficacy and efficiency in resource-constrained environments.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Parmar, K. and Jinwala, D. (2015) Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks. Journal of Information Security, 6, 38-50. doi: 10.4236/jis.2015.61005.

References

[1] MEMSIC (2014) MICAz Mote Platform.
http://www.memsic.com/userfiles/files/Datasheets/WSN/6020-0060-04-B_MICAz.pdf
[2] MEMSIC (2014) TelosB Mote Platform.
http://www.memsic.com/userfiles/files/Datasheets/WSN/6020-0094-02_B_TELOSB.pdf
[3] Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks: The International Journal of Computer and Telecommunications Net- working, 38, 393-422. http://dx.doi.org/10.1016/S1389-1286(01)00302-4
[4] Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000) System Architecture Directions for Networked Sensors. ACM SIGPLAN Notices, 35, 93-104.
http://dx.doi.org/10.1145/356989.356998
[5] Fasolo, E., Rossi, M., Widmer, J. and Zorzi, M. (2007) In-Network Aggregation Techniques for Wireless Sensor Networks: A Survey. IEEE Wireless Communications, 14, 70-87.
http://dx.doi.org/10.1109/MWC.2007.358967
[6] Chan, H. and Perrig, A. (2003) Security and Privacy in Sensor Networks. Computer, 36, 103-105.
http://dx.doi.org/10.1109/MC.2003.1236475
[7] Perrig, A., Stankovic, J. and Wagner, D. (2004) Security in Wireless Sensor Networks. Communi- cations of the ACM, 47, 53-57.http://dx.doi.org/10.1145/990680.990707
[8] Wang, Y., Attebury, G. and Ramamurthy, B. (2006) A Survey of Security Issues in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 8, 2-23.
http://dx.doi.org/10.1109/COMST.2006.315852
[9] Ozdemir, S. and Xiao, Y. (2009) Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview. Computer Networks: The International Journal of Computer and Tele- communications Networking, 53, 2022-2037. http://dx.doi.org/10.1016/j.comnet.2009.02.023
[10] Girao, J., Schneider, M. and Westhoff, D. (2004) CDA: Concealed Data Aggregation in Wireless Sensor Networks. Proceedings ACM Workshop on Wireless Security, WiSe’04, Poster Presentation, Philadelphia.
[11] Girao, J., Westho, D. and Schneider, M. (2005) CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks. Proceedings of the 40th International Conference on Communications, Seoul, 16-20 May 2005, 3044-3049.
[12] Rivest, R.L., Adleman, L. and Dertouzos, M.L. (1978) On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation, 4, 169-180.
[13] Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E. and Culler, D. (2005) TinyOS: An Operating System for Sensor Networks. In: Weber, W., Rabaey, J.M. and Aarts, E., Eds., Ambient Intelligence, Springer Berlin Heidelberg, Berlin, 115-148. http://dx.doi.org/10.1007/3-540-27139-2_7
[14] Hu, L. and Evans, D. (2003) Secure Aggregation for Wireless Networks. Proceedings of the Symposium on Applications and the Internet Workshops, Washington DC, 27-31 January 2003, 384-391.
[15] Przydatek, B., Song, D. and Perrig, A. (2003) SIA: Secure Information Aggregation in Sensor Networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, 5-7 November 2003, 255-265.
[16] Sang, Y., Shen, H., Inoguchi, Y., Tan, Y. and Xiong, N. (2006) Secure Data Aggregation in Wireless Sensor Networks: A Survey. Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, Taipei, 4-7 December 2006, 315-320.
[17] Domingo-Ferrer, J. (2002) A Provably Secure Additive and Multiplicative Privacy Homomorphism. Proceedings of the 5th International Conference on Information Security, Berlin, 30 September-2 October 2002, 471-483.
[18] Castelluccia, C., Mykletun, E. and Tsudik, G. (2005) Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Washington DC, 17-21 July 2005, 109-117.
[19] Castelluccia, C., Chan, A.C.F., Mykletun, E. and Tsudik, G. (2009) Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 5, 1-36. http://dx.doi.org/10.1145/1525856.1525858
[20] Peter, S., Piotrowski, K. and Langendoerfer, P. (2007) On Concealed Data Aggregation for Wireless Sensor Networks. Proceedings of the 4th IEEE Consumer Communications Networking Conference, Las Vegas, 11-13 January 2007, 192-196.
[21] Mykletun, E., Girao, J. and Westho, D. (2006) Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks. Proceedings of the IEEE International Conference on Communications, Istanbul, 11-15 June 2006, 2288-2295.
[22] Ugus, O. (2007) Asymmetric Homomorphic Encryption Transformation for Securing Distributed Data Storage in Wireless Sensor Networks. Technische Universität Darmstadt, Darmstadt.
[23] Koblitz, N. (1987) Elliptic Curve Cryptosystems. Mathematics of Computation, 48, 203-209.
http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5
[24] Fontaine, C. and Galand, F. (2007) A Survey of Homomorphic Encryption for Nonspecialists. EURASIP Journal on Information Security, 2007, 1-10. http://dx.doi.org/10.1155/2007/13801
[25] Dolev, D., Dwork, C. and Naor, M. (1991) Non-Malleable Cryptography. Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, New York, 5-8 May 1991, 542-552.
[26] Racko, C. and Simon, D. (1992) Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J., Ed., Advances in Cryptology—CRYPTO ’91, Springer Berlin Heidelberg, Berlin, 433-444.
[27] Chan, A.C.F. and Castelluccia, C. (2008) On the (Im)possibility of Aggregate Message Authentication Codes. Proceedings of the IEEE International Symposium on Information Theory, Toronto, 6-11 July 2008, 235-239.
[28] Agrawal, S. and Boneh, D. (2009) Homomorphic MACs: MAC-Based Integrity for Network Coding. Proceedings of the 7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, 2-5 June 2009, 292-305.
[29] Johnson, R., Molnar, D., Song, D.X. and Wagner, D. (2002) Homomorphic Signature Schemes. Proceedings of the Cryptographers’ Track at the RSA Conference, San Jose, 18-22 February 2002, 244-262.
[30] Boneh, D., Freeman, D., Katz, J. and Waters, B. (2009) Signing a Linear Subspace: Signature Schemes for Network Coding. Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, 18-20 March 2009, 68-87.
[31] Westho, D., Girao, J. and Acharya, M. (2006) Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. IEEE Transactions on Mobile Computing, 5, 1417-1431. http://dx.doi.org/10.1109/TMC.2006.144
[32] Okamoto, T. and Uchiyama, S. (1998) A New Public-Key Cryptosystem as Secure as Factoring. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Espoo, 31 May-4 June 1998, 303-318.
[33] Paillier, P. (2000) Trapdooring Discrete Logarithms on Elliptic Curves over Rings. Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, 3-7 December 2000, 573-584.
[34] Liu, A. and Ning, P. (2008) TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks, St. Louis, 22-24 April 2008, 245-256.
[35] Karlof, C., Sastry, N. and Wagner, D. (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, 3-5 November 2004, 162-175. http://dx.doi.org/10.1145/1031495.1031515
[36] Karlof, C. and Wagner, D. (2003) Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks, 1, 293-315. http://dx.doi.org/10.1016/S1570-8705(03)00008-8
[37] Newsome, J., Shi, E., Song, D. and Perrig, A. (2004) The Sybil Attack in Sensor Networks: Analysis & Defenses. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004, 259-268.
[38] Li, Z. and Gong, G. (2010) Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks. Proceedings of the 9th International Conference on Ad-Hoc, Mobile and Wireless Net- works, Edmonton, 20-22 August 2010, 149-162.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.