A Survey on the Encryption of Convergecast Traffic with In-Network Processing

被引:47
作者
Peter, Steffen [1 ]
Westhoff, Dirk [2 ]
Castelluccia, Claude [3 ]
机构
[1] IHP GmBH, D-15236 Frankfurt, Oder, Germany
[2] NEC Europe Ltd, D-69115 Heidelberg, Germany
[3] INRIA Grenoble Rhone Alpes, F-38334 Saint Ismier, France
关键词
Cryptography; wireless sensor networks; convergecast; concealed data aggregation; SENSOR NETWORKS;
D O I
10.1109/TDSC.2008.23
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages are 1) neither keys nor plaintext is available at aggregating nodes, 2) the overall energy consumption of the backbone can be reduced, 3) the system is more flexible with respect to changing routes, and finally 4) the overall system security increases. We provide a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.
引用
收藏
页码:20 / 34
页数:15
相关论文
共 31 条
[1]  
ACHARYA M, 2005, P 3 INT S MOD OPT MO
[2]  
ADLER JM, 2000, P ANN INT C THEOR AP
[3]  
Agrawal R., 2004, P ACM SIGMOD
[4]  
[Anonymous], P ACM C COMP COMM SE
[5]  
[Anonymous], 2005, P 2 ANN INT C MOB UB
[6]  
ARMKNECHT F, 2008, COMPUTER COMM ALGORI
[7]  
Benaloh J., 1994, P WORKSH SEL AR CRYP, P120
[8]  
BRICKELL EF, 1988, P ANN INT C THEOR AP, V304, P117
[9]  
CASTELLUCCIA C, 2006, 2006416 AIE
[10]   ASCENT: Adaptive self-configuring sEnsor networks topologies [J].
Cerpa, A ;
Estrin, D .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2004, 3 (03) :272-285