RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate th...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on parallel and distributed systems 2012-04, Vol.23 (4), p.727-734 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 734 |
---|---|
container_issue | 4 |
container_start_page | 727 |
container_title | IEEE transactions on parallel and distributed systems |
container_volume | 23 |
creator | Chen, Chien-Ming Lin, Yue-Hsun Lin, Ya-Ching Sun, Hung-Min |
description | Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks. |
doi_str_mv | 10.1109/TPDS.2011.219 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TPDS_2011_219</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5989802</ieee_id><sourcerecordid>1019654901</sourcerecordid><originalsourceid>FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</originalsourceid><addsrcrecordid>eNpd0MtLw0AQBvAgCj6PnrwET15SZ_aR7HorrS8oKlrx4CFstpMSTbO6myr9791S8eBphuHHx_AlyTHCABH0-fRh_DRggDhgqLeSPZRSZQwV3447CJnpeN9N9kN4A0AhQewlr4-j8fAifSTrvsibqqV05DpLpqVZOja9SYfzuae56RvXpbXzm-Nt19PcN_0qbbr0pfHUUgjpE3Uhijvqv51_D4fJTm3aQEe_8yB5vrqcjm6yyf317Wg4ySzHos-4kIpLKZgEY4ta2tpUNVazWitTzQrgSIYxW6kaORciB2ZyZIUABbngZPlBcrbJ_fDuc0mhLxdNsNS2piO3DCUC6lwKDRjp6T_65pa-i9-VmuUSgKkiomyDrHcheKrLD98sjF_FpHLddLluulw3XcZGoz_Z-IaI_qzUSitg_AdaTHf-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>926500287</pqid></control><display><type>article</type><title>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Chen, Chien-Ming ; Lin, Yue-Hsun ; Lin, Ya-Ching ; Sun, Hung-Min</creator><creatorcontrib>Chen, Chien-Ming ; Lin, Yue-Hsun ; Lin, Ya-Ching ; Sun, Hung-Min</creatorcontrib><description>Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2011.219</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Agglomeration ; Aggregates ; Base stations ; Concealed data aggregation ; Design engineering ; Detection ; Encryption ; Integrity ; Networks ; privacy homomorphism encryption ; Public key ; Sensors ; Signatures ; Stations ; Wireless sensor networks</subject><ispartof>IEEE transactions on parallel and distributed systems, 2012-04, Vol.23 (4), p.727-734</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</citedby><cites>FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5989802$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5989802$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chen, Chien-Ming</creatorcontrib><creatorcontrib>Lin, Yue-Hsun</creatorcontrib><creatorcontrib>Lin, Ya-Ching</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><title>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.</description><subject>Agglomeration</subject><subject>Aggregates</subject><subject>Base stations</subject><subject>Concealed data aggregation</subject><subject>Design engineering</subject><subject>Detection</subject><subject>Encryption</subject><subject>Integrity</subject><subject>Networks</subject><subject>privacy homomorphism encryption</subject><subject>Public key</subject><subject>Sensors</subject><subject>Signatures</subject><subject>Stations</subject><subject>Wireless sensor networks</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0MtLw0AQBvAgCj6PnrwET15SZ_aR7HorrS8oKlrx4CFstpMSTbO6myr9791S8eBphuHHx_AlyTHCABH0-fRh_DRggDhgqLeSPZRSZQwV3447CJnpeN9N9kN4A0AhQewlr4-j8fAifSTrvsibqqV05DpLpqVZOja9SYfzuae56RvXpbXzm-Nt19PcN_0qbbr0pfHUUgjpE3Uhijvqv51_D4fJTm3aQEe_8yB5vrqcjm6yyf317Wg4ySzHos-4kIpLKZgEY4ta2tpUNVazWitTzQrgSIYxW6kaORciB2ZyZIUABbngZPlBcrbJ_fDuc0mhLxdNsNS2piO3DCUC6lwKDRjp6T_65pa-i9-VmuUSgKkiomyDrHcheKrLD98sjF_FpHLddLluulw3XcZGoz_Z-IaI_qzUSitg_AdaTHf-</recordid><startdate>20120401</startdate><enddate>20120401</enddate><creator>Chen, Chien-Ming</creator><creator>Lin, Yue-Hsun</creator><creator>Lin, Ya-Ching</creator><creator>Sun, Hung-Min</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20120401</creationdate><title>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</title><author>Chen, Chien-Ming ; Lin, Yue-Hsun ; Lin, Ya-Ching ; Sun, Hung-Min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Agglomeration</topic><topic>Aggregates</topic><topic>Base stations</topic><topic>Concealed data aggregation</topic><topic>Design engineering</topic><topic>Detection</topic><topic>Encryption</topic><topic>Integrity</topic><topic>Networks</topic><topic>privacy homomorphism encryption</topic><topic>Public key</topic><topic>Sensors</topic><topic>Signatures</topic><topic>Stations</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Chien-Ming</creatorcontrib><creatorcontrib>Lin, Yue-Hsun</creatorcontrib><creatorcontrib>Lin, Ya-Ching</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Chien-Ming</au><au>Lin, Yue-Hsun</au><au>Lin, Ya-Ching</au><au>Sun, Hung-Min</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2012-04-01</date><risdate>2012</risdate><volume>23</volume><issue>4</issue><spage>727</spage><epage>734</epage><pages>727-734</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2011.219</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1045-9219 |
ispartof | IEEE transactions on parallel and distributed systems, 2012-04, Vol.23 (4), p.727-734 |
issn | 1045-9219 1558-2183 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TPDS_2011_219 |
source | IEEE Electronic Library (IEL) |
subjects | Agglomeration Aggregates Base stations Concealed data aggregation Design engineering Detection Encryption Integrity Networks privacy homomorphism encryption Public key Sensors Signatures Stations Wireless sensor networks |
title | RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T07%3A49%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RCDA:%20Recoverable%20Concealed%20Data%20Aggregation%20for%20Data%20Integrity%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=Chen,%20Chien-Ming&rft.date=2012-04-01&rft.volume=23&rft.issue=4&rft.spage=727&rft.epage=734&rft.pages=727-734&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2011.219&rft_dat=%3Cproquest_RIE%3E1019654901%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=926500287&rft_id=info:pmid/&rft_ieee_id=5989802&rfr_iscdi=true |