About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I

Research Article

Performance Evaluation of Searchable Symmetric Encryption in Wireless Sensor Networks

Download(Requires a free EAI acccount)
258 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-47063-4_4,
        author={Cristina Mu\`{o}oz and Lucas Rocci and Eduardo Solana and Pierre Leone},
        title={Performance Evaluation of Searchable Symmetric Encryption in Wireless Sensor Networks},
        proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I},
        proceedings_a={IOT360},
        year={2017},
        month={1},
        keywords={Searchable Symmetric Encryption Wireless Sensor Networks Bloom Filters Cloud Storage},
        doi={10.1007/978-3-319-47063-4_4}
    }
    
  • Cristina Muñoz
    Lucas Rocci
    Eduardo Solana
    Pierre Leone
    Year: 2017
    Performance Evaluation of Searchable Symmetric Encryption in Wireless Sensor Networks
    IOT360
    Springer
    DOI: 10.1007/978-3-319-47063-4_4
Cristina Muñoz1,*, Lucas Rocci1,*, Eduardo Solana1,*, Pierre Leone1,*
  • 1: University of Geneva
*Contact email: Cristina.Munoz@unige.ch, Lucas.Rocci@etu.unige.ch, Eduardo.Solana@unige.ch, Pierre.Leone@unige.ch

Abstract

The distributed nature of Wireless Sensor Networks leads to the use of cloud databases that need to be protected when dealing with sensitive content. In this context, Searchable Symmetric Encryption provides the appropriate framework to perform secure searches. This work proposes a combination of secure indexes with Bloom Filters to efficiently address searches in encrypted content. We evaluate the performance of two different strategies to populate Bloom Filters in XM1000, Z1 and TelosB wireless sensor devices: (1) we first consider four cryptographic hash functions using the double hashing technique and truncating message digests; (2) we then select five symmetric encryption algorithms and two fast hash functions also with double hashing. We conclude that the best strategy for securing indexes is AES plus a fast FNV hash function and double hashing.

Keywords
Searchable Symmetric Encryption Wireless Sensor Networks Bloom Filters Cloud Storage
Published
2017-01-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-47063-4_4
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL