Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 6
Year of Publication: 2015
Authors:
Kaushal J. Patel
Nirav M. Raja
10.5120/21706-4821

Kaushal J Patel and Nirav M Raja. Article: Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network. International Journal of Computer Applications 122(6):27-32, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Kaushal J. Patel and Nirav M. Raja},
	title = {Article: Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {6},
	pages = {27-32},
	month = {July},
	note = {Full text available}
}

Abstract

Wireless Sensor Networks is made of a large number of low-cost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregation is the process of summarizing and merging sensor data to be able to minimize the number of data transmission in the network. Cluster based Data Aggregation approach, the data sensed by the sensor nodes are transferred to the cluster head and in the cluster head performs data aggregation and forwards results to the sink. Data aggregation could conserve energy (power) as well as bandwidth of the networks. As wireless sensor networks are generally used in remote and hostile environments in order to transfer very sensitive information, sensor nodes are susceptible to node compromise attacks and security problems such as data confidentiality and integrity are extremely crucial. Therefore, Secure Data aggregation protocol, must be designed with security in mind and investigates the relationship between security and data aggregation process within wireless sensor networks. In this paper, the secure data aggregation schemes are categorized into hop by hop aggregation and end to end aggregation. Here we explore a Homomorphic aggregation system based on a public key encryption (PKE) scheme to protect sensor data secure is proposed. Security analysis shows that our proposed protocol can guarantee end-to-end confidentiality and privacy.

References

  • I. Akyildiz, W. Su, M. Vuran, and E. Cayirci, "A Survey On Sensor Networks", IEEE Communications Magazine, Volume 40, Number, 2002.
  • P. N. Renjith, E. Baburaj, "An Analysis on Data Aggregation in wireless sensor networks", ICRCC © 2012.
  • Chanjuan Wei, Yanjie Gao, J. Yang, "Cluster-Based Routing protocols in Wireless Sensor Network: A Survey", IEEE © 2011.
  • Yan-Xiao Li, Lian-Qin, Qian-Liang, "Research On Wireless Sensor Network Security", IEEE © 2010.
  • Yingpeng Sang, Hong Shen, "Secure Data Aggregation in Wireless Sensor Networks: A Survey", IEEE © 2006.
  • Jia Guo, Jian'an Fang, Xuemin Chen, "Survey on Secure Data Aggregation for Wireless Sensor Networks", IEEE © 2011.
  • A. S. Poornima, B. B. Amberker, "SEEDA : Secure End-to-End Data Aggregation in Wireless Sensor Networks", IEEE © 2010.
  • Hung-Min Sun, Chiung-Hsun Chen, and Po-Chi Li, "A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks", IEEE © 2011.
  • Juan Wei, Shanqing Guo, Qiuliang Xu, "Secure Homomorphic Aggregation Algorithm of Mixed Operations in Wireless Sensor Networks", IEEE © 2011.
  • Suat Ozdemir, Yang Xiao, "Secure data aggregation in wireless sensor networks: A Comprehensive overview", ELSEVIER © 2009.
  • Soufiene Ben Othman, Abdullah Ali Bahattab, Abdelbasset Trad & Habib Youssef, "Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption", Springer 2014.
  • Josna Jose, Joyce Jose, "Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey", Modern Education and Computer Science Press 2014.
  • Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Hani Alzaid, "Secure Data Aggregation in Wireless Sensor Networks", IEEE © 2013.
  • Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar. " Secure encrypted-data aggregation for wireless sensor networks", Springer Science 2009.
  • Sanjeev Setia, Sankardas roy and Sushil jajodia "Secure Data Aggregation in Wireless Sensor Networks" IEEE.
  • Wenbo He, Hoang Nguyen, Xue Liu, Klara Nahrstedt, Tarek Abdelzaher. "SPDA: Secure and Privacy- preserving Data Aggregation in Wireless Sensor Networks".
  • T. Okamoto and S. Uchiyama. A New Public-Key Cryptosystem as Secure as Factoring. Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '98), 1998, pp. 308-318.
  • C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems, July 2005, pp. 109-117.
  • Jacques Bahi, Christophe Guyeux, Abdallah Makhoul. Secure Data Aggregation in Wireless Sensor Networks.
  • Homomorphism versus Watermarking Approach. ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks, Dec 2009, Canada.
  • Kaushal J. Patel, Nirav M. Raja," An Overview of Secure Data Aggregation in Wireless Sensor Network" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015. (ISSN 2277 128X ).
  • Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar "Secure Encrypted-data aggregation for wireless sensor network" Springer © 2010.