A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy...

Full description

Bibliographic Details
Main Authors: Qiang Zhou, Geng Yang, Liwen He
Format: Article
Language:English
Published: MDPI AG 2014-04-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/14/4/6701
id doaj-26864a352c464a23a042c86df496754e
record_format Article
spelling doaj-26864a352c464a23a042c86df496754e2020-11-24T21:39:30ZengMDPI AGSensors1424-82202014-04-011446701672110.3390/s140406701s140406701A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor NetworksQiang Zhou0Geng Yang1Liwen He2Institute of Advanced Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, ChinaSchool of Computer Science & Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, ChinaInstitute of Advanced Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, ChinaData aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC). The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH) and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS) by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.http://www.mdpi.com/1424-8220/14/4/6701wireless sensor networksdata aggregationElliptic Curve Cryptography (ECC)data integritydata privacy
collection DOAJ
language English
format Article
sources DOAJ
author Qiang Zhou
Geng Yang
Liwen He
spellingShingle Qiang Zhou
Geng Yang
Liwen He
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
Sensors
wireless sensor networks
data aggregation
Elliptic Curve Cryptography (ECC)
data integrity
data privacy
author_facet Qiang Zhou
Geng Yang
Liwen He
author_sort Qiang Zhou
title A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
title_short A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
title_full A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
title_fullStr A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
title_full_unstemmed A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
title_sort secure-enhanced data aggregation based on ecc in wireless sensor networks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2014-04-01
description Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC). The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH) and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS) by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.
topic wireless sensor networks
data aggregation
Elliptic Curve Cryptography (ECC)
data integrity
data privacy
url http://www.mdpi.com/1424-8220/14/4/6701
work_keys_str_mv AT qiangzhou asecureenhanceddataaggregationbasedoneccinwirelesssensornetworks
AT gengyang asecureenhanceddataaggregationbasedoneccinwirelesssensornetworks
AT liwenhe asecureenhanceddataaggregationbasedoneccinwirelesssensornetworks
AT qiangzhou secureenhanceddataaggregationbasedoneccinwirelesssensornetworks
AT gengyang secureenhanceddataaggregationbasedoneccinwirelesssensornetworks
AT liwenhe secureenhanceddataaggregationbasedoneccinwirelesssensornetworks
_version_ 1725931059925745664