Total views : 215

Implementing Privacy Homomorphism in Data Aggregation for Wireless Sensor Networks

Affiliations

  • Department of Electronics and Computer Engineering, KL University, Vijayawada - 522502, Andhra Pradesh, India

Abstract


Objective: To design and implement a methodology to achieve privacy and security of data in Wireless Sensor Network (WSN) through malleability resilient concealed data aggregation protocol. Analysis: The aim of concealed collection of data in WSN is to provide privacy preservation of the data at both Intermediate Nodes (IN) and at Base Stations (BS) while aiding in-network data aggregation. The data aggregation which can be executed using privacy homomorphism at both INs and BS and is naturally malleable as the encrypted data was processed at INs without decrypting. Hence it is dreadful challenge to recognize constraints like point-to-point privacy and integrity in carrying out the aggregation. Methodology: In this paper, for protecting against passive and active adversaries in the network we propose a malleability resilient concealed data aggregation protocol. The proposed protocol protects the data from the opposing targets like privacy at both IN and at base station, point-to-point integrity, point-to-point privacy, replay protection, and aggregation. Findings/ Improvements: The major contribution of the proposed scheme verifies freshness of the data before performing encrypted data at INs as well as at BS. It also protects the data from the insider attacks as well as the outside. Thus, the protocol improves the privacy homomorphism of the data and verification of data freshness continuously at INs and also at BS.

Keywords

Concealed Data Aggregation, Malleable, Privacy Homomorphism, Point-to-Point Privacy, Point-to-Point Integrity, Secure Data Aggregation, Wireless Sensor Networks

Full Text:

 |  (PDF views: 202)

References


  • Thiriveni GV, Ramakrishnan M. Distributed Clustering based Energy Efficient Routing Algorithm for Heterogeneous Wireless Sensor Networks. Indian Journal of Science and Technology. 2016; 9(3):1–6.
  • Anastasi G, Conti M, Di Francesco M, Passarella A. Energy conservation in wireless sensor networks: A survey. Ad Hoc Networks. 2009; 7(3):537–68.
  • Fasolo E, Rossi M, Widmer J, Zorzi M. In-network aggregation techniques for wireless sensor networks: A survey.Wireless Communications. 2007; 14(2):70–87.
  • Sasirekha S, Swamynathan S. A Comparative Study and Analysis of Data Aggregation Techniques in WSN. Indian Journal of Science and Technology. 2015; 8(26):1–10.
  • Pandey GK, Singh AP. Energy Conservation and Efficient Data Collection in WSN-ME: A Survey. Indian Journal of Science and Technology. 2015; 8(17):1–11.
  • Saikeerthana R, Umamakeswari A. Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption. Indian Journal of Science and Technology. 2015; 8(S9):318–25.
  • Sarath Chandra MS, Raghava Rao K, Hussain MA. An Efficient Scheme for Facilitating Secure Data Sharing in Decentralized Disruption Tolerant Networks. Indian Journal of Science and Technology. 2016; 9(5):1–13.
  • Riverst RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms Foundations of Secure Computation. 1978; 4(11):169–80.
  • Hariharan R, Mahesh C, Prasenna P, Vinoth Kumar R.Enhancing Privacy Preservation in Data Mining using Cluster based Greedy Method in Hierarchical Approach.Indian Journal of Science and Technology. 2016; 9(3):1–8.
  • Agrawal S, Boneh D. Homomorphic MACs: MAC-based integrity for network coding. Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS’09, Lecture Notes in Computer Science. Paris-Rocquencourt: Springer. 2009; 5536. p. 292– 305.
  • Westhoff D, Ugus O. Malleability resilient (premium) concealed data aggregation. Proceedings of the 4th IEEE International Workshop on Data Security and Privacy in Wireless Networks, D-SPAN’13. Madrid: IEEE. 2013:1–6
  • Riverst RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms Foundations of Secure Computation. 1978; 4(11):169–80.
  • Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation. 1987; 48(177):203–9.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.