Privacy Preserving Data Aggregation and Data Integrity in WSN

Authors

  • Maharajan K PG Student Department of Information Technology, Bharathiar University, Tamil Nadu India
  • Vadivel R Assistant Professor Department of Information Technology, Bharathiar University, Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v10i5.5357

Keywords:

Concealed Data Aggregation, Wireless sensor networks,, privacy homomorphism encryption

Abstract

Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. For example, the base station cannot retrieve the maximum value of all sensing data if the aggregated result is the summation of sensing data. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. In this paper, we attempt to overcome the above two drawbacks. In our design, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable.” Experiment results demonstrate that the transmission overhead is still reduced even if our approach is recoverable on sensing data. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor network.

References

[1] R. Rajagopalan and P. Varshney, “Data-Aggregation Techniques in Sensor Networks: A Survey,” IEEE Comm. Surveys Tutorials, vol.8, no.4, pp.48-63, Oct.-Nov. 2006.

[2] S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, “TAG:A Tiny Aggregation Service for Ad-Hoc Sensor Networks,”Proc. Fifth Symp. Operating Systems Design and Implementation,2002.

[3]J.-Y. Chen, G. Pandurangan, and D. Xu, “Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis,” IEEE Trans. Parallel Distributed Systems, vol.17, no.9, pp.987-1000, Sept.2006.

[4] H.C¸ am, S. O ¨ zdemir, P. Nair, D. Muthuavinashiappan, and H.Ozgur Sanli, “Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks,” J. Computer Comm., vol.29, pp.446-455, 2006.

[5] H.Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks,”Proc. IEEE 60th Int’l Conf. Vehicular Technology (VTC ’04-Fall),vol.7, pp.4650-4654, Sep det. 2004.

Downloads

Published

2022-05-31
CITATION
DOI: 10.26438/ijcse/v10i5.5357
Published: 2022-05-31

How to Cite

[1]
K. Maharajan and R. Vadivel, “Privacy Preserving Data Aggregation and Data Integrity in WSN”, Int. J. Comp. Sci. Eng., vol. 10, no. 5, pp. 53–57, May 2022.

Issue

Section

Research Article