Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks

被引:227
作者
Castelluccia, Claude [1 ]
Chan, Aldar C-F [2 ]
Mykletun, Einar [3 ]
Tsudik, Gene [4 ]
机构
[1] INRIA, F-38334 Saint Ismier, France
[2] Natl Univ Singapore, Dept Comp Sci, Sch Comp, Singapore 117548, Singapore
[3] Quest Software, Aliso Viejo, CA USA
[4] Univ Calif Irvine, Dept Comp, Irvine, CA USA
关键词
Design; Security; Authentication; privacy; pseudorandom functions; secure data aggregation; stream ciphers; wireless sensor networks; cryptography; KEY; SIGNATURES;
D O I
10.1145/1525856.1525858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity) is required. In this article, we propose a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data. Only one modular addition is necessary for ciphertext aggregation. The security of the scheme is based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. We show that aggregation based on this scheme can be used to efficiently compute statistical values, such as mean, variance, and standard deviation of sensed data, while achieving significant bandwidth savings. To protect the integrity of the aggregated data, we construct an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, also based on the indistinguishability property of PRFs.
引用
收藏
页码:1 / 36
页数:36
相关论文
共 33 条
[1]  
[Anonymous], 1996, LNCS, DOI DOI 10.1007/3-540-68697-5_1
[2]  
[Anonymous], 2003, WORKSH SEC ASS AD HO
[3]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[4]  
[Anonymous], 2001, Specification for the Advanced Encryption Standard.
[5]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]  
Buttyan L., 2006, SASN, P83
[7]  
Castelluccia C., 2005, P MOBIQUITOUS, P1
[8]  
Castelluccia C., 2008, P 6 INT S MOD OPT MO
[9]  
CHAN ACF, 2008, P IEEE INT S INF THE
[10]  
Chan ACF, 2007, LECT NOTES COMPUT SC, V4734, P390