3rd International ICST Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks

Research Article

Secure comparison of encrypted data in wireless sensor networks

  • @INPROCEEDINGS{10.1109/WIOPT.2005.44,
        author={M.  Acharya and J.  Girao and D.  Westhoff},
        title={Secure comparison of encrypted data in wireless sensor networks},
        proceedings={3rd International ICST Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2005},
        month={4},
        keywords={},
        doi={10.1109/WIOPT.2005.44}
    }
    
  • M. Acharya
    J. Girao
    D. Westhoff
    Year: 2005
    Secure comparison of encrypted data in wireless sensor networks
    WIOPT
    IEEE
    DOI: 10.1109/WIOPT.2005.44
M. Acharya1, J. Girao1, D. Westhoff1
  • 1: Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA

Abstract

End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party wireless sensor network implementations to become meaningful and profitable. For wireless sensor networks, we demonstrated in our previous work that privacy homomorphisms, when used for this purpose, offer two striking advantages apart from end-to-end concealment of data and ability to operate on ciphertexts: flexibility by keyless aggregation and conservation and balancing of aggregator backbone energy. We offered proof of concept by applying a certain privacy homomorphism for sensor network applications that rely on the addition operation. But a large class of aggregator functions like median computation or finding maximum/minimum rely exclusively on comparison operations. Unfortunately, as shown by Rivest, et al., any privacy homomorphism is insecure even against ciphertext that only attacks if they support comparison operations. In this paper we show that a particular order preserving encryption scheme achieves the above mentioned energy benefits and flexibility when used to support comparison operations over encrypted texts for wireless sensor networks, while also managing to hide the plaintext distribution and being secure against ciphertext only attacks. The scheme is shown to have reasonable memory and computation overhead when applied for wireless sensor networks.