Limits...
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.

Li X, Chen D, Li C, Wang L - Sensors (Basel) (2015)

Bottom Line: Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication.Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well.Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.

View Article: PubMed Central - PubMed

Affiliation: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China. lixing0409@163.com.

ABSTRACT
With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people's lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.

No MeSH data available.


Related in: MedlinePlus

The message transmission process in the formation of MFN-group.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541862&req=5

sensors-15-15952-f003: The message transmission process in the formation of MFN-group.

Mentions: In the network of this scheme there are T MFN-groups formed, each of which consists of a monitoring node of Ac, a forwarding node of Ac and a neighboring node of An. It is assumed that a monitoring node can establish a group key Kgroup with its members that are multiple hops away using an existing group key establishment scheme such as [22].We assume that a path already exists between any two consecutive aggregators via forwarding nodes, and that each aggregator uses only one outgoing path towards BS at a given time. These two consecutive aggregators form one pair and share a symmetric key for false data detection. If they do not have a shared key, they establish a symmetric key Kpair using an existing pairwise key establishment algorithm such as direct key establishment method [20]. The message transmission process in the formation of MFN-group is showed in Figure 3. The formation process of MFN-groups includes the following steps:Figure 3


Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.

Li X, Chen D, Li C, Wang L - Sensors (Basel) (2015)

The message transmission process in the formation of MFN-group.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541862&req=5

sensors-15-15952-f003: The message transmission process in the formation of MFN-group.
Mentions: In the network of this scheme there are T MFN-groups formed, each of which consists of a monitoring node of Ac, a forwarding node of Ac and a neighboring node of An. It is assumed that a monitoring node can establish a group key Kgroup with its members that are multiple hops away using an existing group key establishment scheme such as [22].We assume that a path already exists between any two consecutive aggregators via forwarding nodes, and that each aggregator uses only one outgoing path towards BS at a given time. These two consecutive aggregators form one pair and share a symmetric key for false data detection. If they do not have a shared key, they establish a symmetric key Kpair using an existing pairwise key establishment algorithm such as direct key establishment method [20]. The message transmission process in the formation of MFN-group is showed in Figure 3. The formation process of MFN-groups includes the following steps:Figure 3

Bottom Line: Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication.Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well.Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.

View Article: PubMed Central - PubMed

Affiliation: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China. lixing0409@163.com.

ABSTRACT
With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people's lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.

No MeSH data available.


Related in: MedlinePlus