Team for Research in
Ubiquitous Secure Technology

Secure encrypted-data aggregation for wireless sensor networks
Shiuhpyng Winston Shieh, Shih-I Eric Huang, Doug Tygar

Citation
Shiuhpyng Winston Shieh, Shih-I Eric Huang, Doug Tygar. "Secure encrypted-data aggregation for wireless sensor networks". ACM journal of Wireless Networks, May 2009.

Abstract
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. Conventional aggregation functions operate when readings are received in plaintext. If readings are encrypted, aggregation requires decryption creating extra overhead and key management issues. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet. Our scheme is resilient to known-plaintext attacks, chosen-plaintext attacks, ciphertext-only attacks and man-in-the-middle attacks. Our experiments show that our proposed aggregation method significantly reduces communication overhead and can be practically implemented in on-the-shelf sensor platforms.

Electronic downloads

Citation formats  
  • HTML
    Shiuhpyng Winston Shieh, Shih-I Eric Huang, Doug Tygar.
    <a href="http://www.truststc.org/pubs/724.html"
    >Secure encrypted-data aggregation for wireless sensor
    networks</a>, <i>ACM journal of Wireless
    Networks</i>, May 2009.
  • Plain text
    Shiuhpyng Winston Shieh, Shih-I Eric Huang, Doug Tygar.
    "Secure encrypted-data aggregation for wireless sensor
    networks". <i>ACM journal of Wireless
    Networks</i>, May 2009.
  • BibTeX
    @article{ShiehHuangTygar09_SecureEncrypteddataAggregationForWirelessSensorNetworks,
        author = {Shiuhpyng Winston Shieh and Shih-I Eric Huang and
                  Doug Tygar},
        title = {Secure encrypted-data aggregation for wireless
                  sensor networks},
        journal = {ACM journal of Wireless Networks},
        month = {May},
        year = {2009},
        abstract = {This paper proposes a secure encrypted-data
                  aggregation scheme for wireless sensor networks.
                  Our design for data aggregation eliminates
                  redundant sensor readings without using encryption
                  and maintains data secrecy and privacy during
                  transmission. Conventional aggregation functions
                  operate when readings are received in plaintext.
                  If readings are encrypted, aggregation requires
                  decryption creating extra overhead and key
                  management issues. In contrast to conventional
                  schemes, our proposed scheme provides security and
                  privacy, and duplicate instances of original
                  readings will be aggregated into a single packet.
                  Our scheme is resilient to known-plaintext
                  attacks, chosen-plaintext attacks, ciphertext-only
                  attacks and man-in-the-middle attacks. Our
                  experiments show that our proposed aggregation
                  method significantly reduces communication
                  overhead and can be practically implemented in
                  on-the-shelf sensor platforms.},
        URL = {http://www.truststc.org/pubs/724.html}
    }
    

Posted by Jessica Gamble on 7 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.