Research Article
Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach
@INPROCEEDINGS{10.1007/978-3-642-17994-5_23, author={Jacques Bahi and Christophe Guyeux and Abdallah Makhoul}, title={Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach}, proceedings={Ad Hoc Networks. Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers}, proceedings_a={ADHOCNETS}, year={2012}, month={5}, keywords={wireless sensor networks secure data aggregation authentication homomorphic encryption elliptic curves watermarking}, doi={10.1007/978-3-642-17994-5_23} }
- Jacques Bahi
Christophe Guyeux
Abdallah Makhoul
Year: 2012
Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach
ADHOCNETS
Springer
DOI: 10.1007/978-3-642-17994-5_23
Abstract
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. Hence, transmissions are a very energy-consuming operation. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, usually the carried information contains confidential data. Therefore, an end-to-end secure aggregation approach is required to ensure a healthy data reception. End-to-end encryption schemes that support operations over cypher-text have been proved important for private party sensor network implementations. These schemes offer two main advantages: end-to-end concealment of data and ability to operate on cipher text, then no more decryption is required for aggregation. Unfortunately, nowadays these methods are very complex and not suitable for sensor nodes having limited resources. In this paper, we propose a secure end-to-end encrypted-data aggregation scheme. It is based on elliptic curve cryptography that exploits a smaller key size. Additionally, it allows the use of higher number of operations on cypher-texts and prevents the distinction between two identical texts from their cryptograms. These properties permit to our approach to achieve higher security levels than existing cryptosystems in sensor networks. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead and can be practically implemented in on-the-shelf sensor platforms. By using homomorphic encryption on elliptic curves, we thus have realized an efficient and secure data aggregation in sensor networks. Lastly, to enlarge the aggregation functions that can be used in a secure wireless sensor network, a watermarking-based authentication scheme is finally proposed.