A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2014-04-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/14/4/6701 |
id |
doaj-26864a352c464a23a042c86df496754e |
---|---|
record_format |
Article |
spelling |
doaj-26864a352c464a23a042c86df496754e2020-11-24T21:39:30ZengMDPI AGSensors1424-82202014-04-011446701672110.3390/s140406701s140406701A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor NetworksQiang Zhou0Geng Yang1Liwen He2Institute of Advanced Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, ChinaSchool of Computer Science & Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, ChinaInstitute of Advanced Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, ChinaData aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC). The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH) and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS) by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.http://www.mdpi.com/1424-8220/14/4/6701wireless sensor networksdata aggregationElliptic Curve Cryptography (ECC)data integritydata privacy |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Qiang Zhou Geng Yang Liwen He |
spellingShingle |
Qiang Zhou Geng Yang Liwen He A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks Sensors wireless sensor networks data aggregation Elliptic Curve Cryptography (ECC) data integrity data privacy |
author_facet |
Qiang Zhou Geng Yang Liwen He |
author_sort |
Qiang Zhou |
title |
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks |
title_short |
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks |
title_full |
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks |
title_fullStr |
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks |
title_full_unstemmed |
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks |
title_sort |
secure-enhanced data aggregation based on ecc in wireless sensor networks |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2014-04-01 |
description |
Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC). The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH) and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS) by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes. |
topic |
wireless sensor networks data aggregation Elliptic Curve Cryptography (ECC) data integrity data privacy |
url |
http://www.mdpi.com/1424-8220/14/4/6701 |
work_keys_str_mv |
AT qiangzhou asecureenhanceddataaggregationbasedoneccinwirelesssensornetworks AT gengyang asecureenhanceddataaggregationbasedoneccinwirelesssensornetworks AT liwenhe asecureenhanceddataaggregationbasedoneccinwirelesssensornetworks AT qiangzhou secureenhanceddataaggregationbasedoneccinwirelesssensornetworks AT gengyang secureenhanceddataaggregationbasedoneccinwirelesssensornetworks AT liwenhe secureenhanceddataaggregationbasedoneccinwirelesssensornetworks |
_version_ |
1725931059925745664 |