http://iet.metastore.ingenta.com
1887

Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks

Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In recent years, some research used classical and heavyweight encryption technology to realise data privacy and integrity protection in data aggregation of wireless sensor networks. The challenge is the balance between resource constraints and the complexity of the deployment. In this study, the authors proposed a lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks (LIPDA) which has lightweight, secure and easy operability to preserve data privacy and integrity during data aggregation in wireless sensor network. First, a distance-based formation scheme of network topology is presented to balance the energy consumption of cluster heads. Then, a structure of complex number, which composes from the private factor of the nodes and the original data, is composed. The complex number is encrypted by additive homomorphic encryption method, which can realise the data aggregation without any decryption. Also, the reliability of data is ensured by using integrity verification method based on the complex operation. The theoretical analysis and simulation results show that the proposed scheme LIPDA can meet the requirement of privacy protection. Moreover, compared with related work, LIPDA has lower calculation, less traffic, higher accuracy and verifiable completeness.

References

    1. 1)
      • 1. Li, J., Gao, H.: ‘Survey on sensor network research’, J. Comput. Res. Dev., 2008, 45, (1), pp. 115.
    2. 2)
      • 2. Peng, H., Chen, H., Zhang, X.Y., et al: ‘Location privacy preservation in wireless sensor networks’, J. Softw., 2015, 26, (3), pp. 617639.
    3. 3)
      • 3. Xu, J., Yang, G., Chen, Z., et al: ‘A survey on the privacy-preserving data aggregation in wireless sensor networks’, Commun. Chin., 2015, 12, (5), pp. 162180.
    4. 4)
      • 4. Chen, J., Fang, B.-X., Yin, L.-H.: ‘A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding’, Chin. J. Comput., 2010, 33, (9), pp. 17361747.
    5. 5)
      • 5. Liang, X., Barua, M., Lu, R., et al: ‘Health share: achieving secure and privacy-preserving health information sharing through health social networks’, Comput. Commun., 2012, 35, (15), pp. 19101920.
    6. 6)
      • 6. Xiong, H., Chen, Z., Li, F.: ‘Efficient and multi-level privacy-preserving communication protocol for VANET’, Comput. Electr. Eng., 2012, 38, pp. 573581.
    7. 7)
      • 7. Fan, Y.-J., Chen, H.: ‘Verifiable privacy-preserving top-k query protocol in two-tierd sensor networks’, Chin. J. Comput., 2012, 35, (3), pp. 423433.
    8. 8)
      • 8. Fan, Y.-J., Chen, H., Zhang, X.-Y.: ‘Data privacy preservation in wireless sensor networks’, Chin. J. Comput., 2012, 35, (6), pp. 11311146.
    9. 9)
      • 9. Chow, C.-Y., Mokbel, M.F., He, T.: ‘A privacy-preserving location monitoring system for wireless sensor networks’, IEEE Trans. Mob. Comput., 2011, 10, (1), pp. 94107.
    10. 10)
      • 10. Gaikwad, P.B., Dhage, M.R.: ‘Survey on secure data aggregation in wireless sensor networks’. Int. Conf. on Computing Communication Control and Automation (ICCUBEA), 2015, 2015, pp. 242246.
    11. 11)
      • 11. Bergamini, L., Becchetti, L., Vitaletti, A.: ‘Privacy-preserving environment monitoring in networks of mobile devices’. Proc. of the IFIP TC 6th Int. Conf. on Networking, Valencia, Spain, 2011, pp. 179191.
    12. 12)
      • 12. He, W., Liu, X., Nguyen, H., et al: ‘PDA: privacy-preserving data aggregation in wireless sensor networks’. Proc. of the 26th IEEE Int. Conf. on Computer Communications (INFOCOM), Anchorage, USA, 2007, pp. 20452053.
    13. 13)
      • 13. He, W.B., Liu, X., Nguyen, H.V., et al: ‘A cluster-based protocol to enforce integrity and preserve privacy in data aggregation’. Proceedings of 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, Canada, 2009, pp. 1419.
    14. 14)
      • 14. Ozdemir, S., Xiao, Y.: ‘Integrity protecting hierarchical concealed data aggregation for wireless sensor networks’, Comput. Netw., 2011, 55, (8), pp. 17351746.
    15. 15)
      • 15. Girao, J., Westhoff, D., Schneider, M.: ‘CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks’. Communications, 2005, 2005, pp. 30443049.
    16. 16)
      • 16. Castelluccia, C., Mykletun, E., Tsudik, G.: ‘Efficient aggregation of encrypted data in wireless sensor networks’. The Second Annual Int. Conf. on Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous 2005, 2005, pp. 109117.
    17. 17)
      • 17. Sun, H.-M., Chen, C.-M., Lin, Y.-H.: ‘RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (4), pp. 727734.
    18. 18)
      • 18. Conti, M., Zhang, L., Roy, S., et al: ‘Privacy-preserving robust data aggregation in wireless sensor networks’, Secur. Commun. Netw., 2009, 2, (2), pp. 195213.
    19. 19)
      • 19. Mlaih, E., Aly, S.A.: ‘Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks’. INFOCOM Workshops 2008, 2008, pp. 16.
    20. 20)
      • 20. Bista, R., Kim, Y.K., Song, M.S., et al: ‘Improving data confidentiality and integrity for data aggregation in wireless sensor networks’, IEICE Trans. Inf. Syst., 2012, E95-D, (1), pp. 6777.
    21. 21)
      • 21. Lee, H., Kim, T.H., Chang, J.W.: ‘An efficient data aggregation scheme for protecting the integrity of sensitive data in wireless sensor networks’. Ubiquitous Information Technologies and Applications, Berlin Heidelberg, 2014, pp. 207214.
    22. 22)
      • 22. Horton, M., Culler, D., Pister, K., et al: ‘The commercialization of microsensor motes’, Sensors, 2002, 19, (4), pp. 4048.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0387
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0387
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address