Skip to main content
Log in

Secure encrypted-data aggregation for wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. Conventional aggregation functions operate when readings are received in plaintext. If readings are encrypted, aggregation requires decryption creating extra overhead and key management issues. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet. Our scheme is resilient to known-plaintext attacks, chosen-plaintext attacks, ciphertext-only attacks and man-in-the-middle attacks. Our experiments show that our proposed aggregation method significantly reduces communication overhead and can be practically implemented in on-the-shelf sensor platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Abbreviations

S i :

Sensor mote i

g :

A one-way function having the following property: \( g\left( {x \oplus y} \right) = g\left( x \right) \oplus g\left( y \right) \)

K EK i :

An encryption key randomly generated by sensor mote i

K VK i :

A verification key used to verify data from sensor mote i

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40, 102–114. doi:10.1109/MCOM.2002.1024422.

    Article  Google Scholar 

  2. Acharya, M., & Girao, J. (2005). Secure comparison of encrypted data in wireless sensor networks. In 3rd international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (pp. 47–53).

  3. Al-Karaki, J., Ul-Mustafa, R., & Kamal, A. (2004). Data aggregation in wireless sensor networks—exact and approximate algorithms. In proceedings of the workshop on high performance switching and routing (pp. 241–245).

  4. Atonishi, T., & Matsuda, T. (2006). Impact of aggregation efficiency on GIT routing for wireless sensor networks. In proceedings of IEEE international conference oon parallel processing workshops.

  5. Buttyan, L., Shaffer, P., & Vajda, I. N. (2006). Resilient aggregation with attack detection in sensor networks. In proceedings of the fourth annual IEEE international conference on pervasive computing and communications workshops (p. 332).

  6. Cam, H., Ozdemir, S., Nair, P., Muthuavinashinappan, D., & Ozgur Sanli, H. (2006). ESPDA: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communication, 29, 446–455.

    Article  Google Scholar 

  7. Chen, Y., Liestman, A., & Liu, J. (2006). A hierachical energy-efficient framework for data aggregation in wireless sensor networks. IEEE Transactions on Vehicular Technology, 55, 789–796. doi:10.1109/TVT.2006.873841.

    Article  Google Scholar 

  8. Choi, J., Lee, J., Lee, K., Choi, S., Kwon, W., & Park, H. (2006). Aggregation time control algorithm for time constrained data delivery in wireless sensor networks. In proceedings of vehiculare technology (pp. 563–567).

  9. Considine, J., Li, F., Kollios, G., & Byers, J. (2004). Approximate aggregation techniques for sensor databases. In proceedings of IEEE conference on data engineering (p. 449).

  10. Gatani, L., Lo Re, G., & Ortolani, M. (2006). Robust and efficient data gathering for wireless sensor networks. In proceedings of the 39th Hawaii international conference on system sciences (p. 235).

  11. Girao, J., Westhoff, D., & Schneider, M. (2005). CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In proceedings of 40th international conference on communications (pp. 3044–3049).

  12. Girao, J., Westhoff, D., & Scheneider, M. (2004).Concealed data aggregation in wireless sensor networks. In proceedings of ACM WiSe conference.

  13. Hu, L., & Evans, D. (2003). Secure aggregation for wireless networks. In proceedings of applications and internet workshops (pp. 27–31).

  14. Wagner, D. (2004). Resilient aggregation in sensor networks. In proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 78–87).

  15. Westhoff, D., Girao, J., & Acharya, M. (2006).Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation. In proceedings of IEEE transactions on mobile computing (pp. 1417–1431).

  16. Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2006). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. In proceedings of performance, computing, and communications conference (p. 6).

  17. Intanagonwiwat, C., Govindan, R., Estrin, D., & Heidemann, J. (2003). Directed diffusion for wireless sensor networking. In IEEE/ACM transactions on networking (pp. 2–16).

  18. Jiang, H., & Jin, S. (2006). Scalable and robust aggregation techniques for extracting statistical information in sensor networks. In proceedings of the 26th IEEE international conference on distributed computing systems (p. 69).

  19. Krishnamachari, L., Estrin, D., & Wicker, S. (2002). The impact of data aggregation in wireless sensor networks. In proceedings of distributed computing systems workshops.

  20. Li, H., Yu, H., & Liu, A. (2006). A tree based data collection scheme for wireless sensor network. In proceedings of the IEEE international conference of networking (p. 119).

  21. Raina, M., Ghosh, S., Patro, R., Viswanath, G., & Chadrashekhar, T. (2006). Secure data aggregation using commitment schemes and quasi commutative functions. In proceedings of 1st international symposium on wireless pervasive computing (pp. 16–18).

  22. Shin, S., Lee, J., Baek, J., & Seo, D. (2006). Reliable data aggregation protocol for ad-hoc sensor network environments. In proceedings of the 8th international conference on advanced technology.

  23. Shrivastava, N., Buragohain, C., Agrawal, D., & Suri, S. (2004). Medians and beyond: New aggregation techniques for sensor networks. In proceedings of the 2nd international conferece on embedded networked sensor systems (pp. 239–249).

  24. Li, Z., Li, K., Wen, C., & Soh, Y.(2003). A new chaotic secure communication system. In proceedings of IEEE transactions on communications (pp. 1306–1312).

  25. Li, T., Wu, Y., & Zhu, H. (2006). An efficient scheme for encrypted data aggregation on sensor networks. In proceedings of vehicular technology conference (pp. 831–835).

  26. Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002). TAG: A tiny aggregation service for ad-hoc sensor networks. In proceedings of 5th symposium on operating systems design and implementation.

  27. Mahimkar, A., & Rappaport, T. (2004). SecureDAV: A secure data aggregation and verfication protocol for sensor networks. In proceedings of global communication.

  28. Misra, R., & Mandal, C. (2006). Ant-aggregation: Ant colony algorithm for optimal data aggregation in wireless sensor networks. In proceedings of international conference on wireless and optical communication networks (p. 5).

  29. Moussaoui, O., Ksentini, A., Naimi, M., & Gueroui, M. (2006). Efficient energy saving in wireless sensor networks through hierarchical-based clustering. In proceedings of the seventh IEEE international symposium on computer networks.

  30. Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In proceedings of ACM SenSys conference (pp. 255–265).

  31. Chandramouli, R., Bapatla, S., & Subbalakshmi, K. P. (2006). Battery power-aware encryption. In proceedings of ACM transactions on information and system security (pp. 162–180).

  32. Bao, F. (2003). Cryptoanalysis of a provable secure additive and Multiplicative Privacy Homomorphism. In proceedings of the international workshop on coding and cryptography (pp. 43–50).

  33. Benaloh, J. (1986). Secret sharing homomorphisms: Keeping shares of a secret sharing. In Advances in Cryptology—CRYPTO (pp. 251–260).

  34. Cramer, R., Damgard, I., & Nielsen, J. B. (2001). Multiparty computation from threshold homomorphic encryption. In advances in cryptology—EUROCRYPT (pp. 280–299).

  35. Domingo-Ferrer, J. (2002). A provably secure additive and multiplicative privacy homomorphism. In proceedings of information security conference (pp. 471–483).

  36. Perrig, A., & Tygar, J. D. (2002). Secure boradcast communication in wired and wireless networkss. Dordrecht: Kluwer Academic Publisher.

    Google Scholar 

  37. Schneider, M., & Felten, E. (2000). Efficient commerce protocols based on one-time pads. In proceedings of 16th annual computer security applications conference (p. 317).

  38. Canetti, R., Goldreich, O., & Halevi, S. (1998). The random oracle methodology, revisited. In proceedings of the 30th annual ACM symposium on the theory of computing (pp. 209–218).

  39. Bellare, M., & Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In proceedings of 1st conferendce on computer and communications security (pp. 62–73).

  40. Rackoff, C., & Simon, D. (1991). Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In proceedings of advances in cryptology.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shih-I Huang.

Additional information

This work was supported in part by National Science Foundation, ITRI, Chung Shan Institute of Science and Technology, the International Collaboration for Advancing Security Technology (iCAST) and Taiwan Information Security Center (TWISC), under National Science Council grants NSC96-3114-P-001-002-Y and NSC96-2219-E-009-013, respectively.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, SI., Shieh, S. & Tygar, J.D. Secure encrypted-data aggregation for wireless sensor networks. Wireless Netw 16, 915–927 (2010). https://doi.org/10.1007/s11276-009-0177-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-009-0177-y

Keywords

Navigation