RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on parallel and distributed systems 2012-04, Vol.23 (4), p.727-734
Hauptverfasser: Chen, Chien-Ming, Lin, Yue-Hsun, Lin, Ya-Ching, Sun, Hung-Min
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 734
container_issue 4
container_start_page 727
container_title IEEE transactions on parallel and distributed systems
container_volume 23
creator Chen, Chien-Ming
Lin, Yue-Hsun
Lin, Ya-Ching
Sun, Hung-Min
description Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.
doi_str_mv 10.1109/TPDS.2011.219
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TPDS_2011_219</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5989802</ieee_id><sourcerecordid>1019654901</sourcerecordid><originalsourceid>FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</originalsourceid><addsrcrecordid>eNpd0MtLw0AQBvAgCj6PnrwET15SZ_aR7HorrS8oKlrx4CFstpMSTbO6myr9791S8eBphuHHx_AlyTHCABH0-fRh_DRggDhgqLeSPZRSZQwV3447CJnpeN9N9kN4A0AhQewlr4-j8fAifSTrvsibqqV05DpLpqVZOja9SYfzuae56RvXpbXzm-Nt19PcN_0qbbr0pfHUUgjpE3Uhijvqv51_D4fJTm3aQEe_8yB5vrqcjm6yyf317Wg4ySzHos-4kIpLKZgEY4ta2tpUNVazWitTzQrgSIYxW6kaORciB2ZyZIUABbngZPlBcrbJ_fDuc0mhLxdNsNS2piO3DCUC6lwKDRjp6T_65pa-i9-VmuUSgKkiomyDrHcheKrLD98sjF_FpHLddLluulw3XcZGoz_Z-IaI_qzUSitg_AdaTHf-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>926500287</pqid></control><display><type>article</type><title>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Chen, Chien-Ming ; Lin, Yue-Hsun ; Lin, Ya-Ching ; Sun, Hung-Min</creator><creatorcontrib>Chen, Chien-Ming ; Lin, Yue-Hsun ; Lin, Ya-Ching ; Sun, Hung-Min</creatorcontrib><description>Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2011.219</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Agglomeration ; Aggregates ; Base stations ; Concealed data aggregation ; Design engineering ; Detection ; Encryption ; Integrity ; Networks ; privacy homomorphism encryption ; Public key ; Sensors ; Signatures ; Stations ; Wireless sensor networks</subject><ispartof>IEEE transactions on parallel and distributed systems, 2012-04, Vol.23 (4), p.727-734</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</citedby><cites>FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5989802$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5989802$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chen, Chien-Ming</creatorcontrib><creatorcontrib>Lin, Yue-Hsun</creatorcontrib><creatorcontrib>Lin, Ya-Ching</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><title>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.</description><subject>Agglomeration</subject><subject>Aggregates</subject><subject>Base stations</subject><subject>Concealed data aggregation</subject><subject>Design engineering</subject><subject>Detection</subject><subject>Encryption</subject><subject>Integrity</subject><subject>Networks</subject><subject>privacy homomorphism encryption</subject><subject>Public key</subject><subject>Sensors</subject><subject>Signatures</subject><subject>Stations</subject><subject>Wireless sensor networks</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0MtLw0AQBvAgCj6PnrwET15SZ_aR7HorrS8oKlrx4CFstpMSTbO6myr9791S8eBphuHHx_AlyTHCABH0-fRh_DRggDhgqLeSPZRSZQwV3447CJnpeN9N9kN4A0AhQewlr4-j8fAifSTrvsibqqV05DpLpqVZOja9SYfzuae56RvXpbXzm-Nt19PcN_0qbbr0pfHUUgjpE3Uhijvqv51_D4fJTm3aQEe_8yB5vrqcjm6yyf317Wg4ySzHos-4kIpLKZgEY4ta2tpUNVazWitTzQrgSIYxW6kaORciB2ZyZIUABbngZPlBcrbJ_fDuc0mhLxdNsNS2piO3DCUC6lwKDRjp6T_65pa-i9-VmuUSgKkiomyDrHcheKrLD98sjF_FpHLddLluulw3XcZGoz_Z-IaI_qzUSitg_AdaTHf-</recordid><startdate>20120401</startdate><enddate>20120401</enddate><creator>Chen, Chien-Ming</creator><creator>Lin, Yue-Hsun</creator><creator>Lin, Ya-Ching</creator><creator>Sun, Hung-Min</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20120401</creationdate><title>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</title><author>Chen, Chien-Ming ; Lin, Yue-Hsun ; Lin, Ya-Ching ; Sun, Hung-Min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c317t-34583554250ac7f5cfabf1bdf98abd7031ea22cb8f13344602a61274080643ec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Agglomeration</topic><topic>Aggregates</topic><topic>Base stations</topic><topic>Concealed data aggregation</topic><topic>Design engineering</topic><topic>Detection</topic><topic>Encryption</topic><topic>Integrity</topic><topic>Networks</topic><topic>privacy homomorphism encryption</topic><topic>Public key</topic><topic>Sensors</topic><topic>Signatures</topic><topic>Stations</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Chien-Ming</creatorcontrib><creatorcontrib>Lin, Yue-Hsun</creatorcontrib><creatorcontrib>Lin, Ya-Ching</creatorcontrib><creatorcontrib>Sun, Hung-Min</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Chien-Ming</au><au>Lin, Yue-Hsun</au><au>Lin, Ya-Ching</au><au>Sun, Hung-Min</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2012-04-01</date><risdate>2012</risdate><volume>23</volume><issue>4</issue><spage>727</spage><epage>734</epage><pages>727-734</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called "recoverable." Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2011.219</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1045-9219
ispartof IEEE transactions on parallel and distributed systems, 2012-04, Vol.23 (4), p.727-734
issn 1045-9219
1558-2183
language eng
recordid cdi_crossref_primary_10_1109_TPDS_2011_219
source IEEE Electronic Library (IEL)
subjects Agglomeration
Aggregates
Base stations
Concealed data aggregation
Design engineering
Detection
Encryption
Integrity
Networks
privacy homomorphism encryption
Public key
Sensors
Signatures
Stations
Wireless sensor networks
title RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T07%3A49%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RCDA:%20Recoverable%20Concealed%20Data%20Aggregation%20for%20Data%20Integrity%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=Chen,%20Chien-Ming&rft.date=2012-04-01&rft.volume=23&rft.issue=4&rft.spage=727&rft.epage=734&rft.pages=727-734&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2011.219&rft_dat=%3Cproquest_RIE%3E1019654901%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=926500287&rft_id=info:pmid/&rft_ieee_id=5989802&rfr_iscdi=true