Evaluating Homomorphic Encryption Algorithms for Privacy in Wireless Sensor Networks
نویسندگان
چکیده
The Wireless Sensor Networks (WSNs) consist of the sensor nodes those are severely resource constrained. Hence, the protocols devised for the WSNs employ every possible means of optimizing the associated overhead.The WSNs typically, employ in-network processing that is largely based on the data aggregation operations that aggregate the data into a compact representation for further transmission. However, when aggregating a number of different data packets, the integrity of the data values used for aggregation as well as the security of the aggregator node itself, assume prime importance. Even otherwise, due to the ubiquitous and pervasive deployment of the sensor nodes on one hand and due to the resource intensive nature of security algorithms, it is challenging to devise the security protocols for WSNs. Consequently, the protocols for ensuring secure data aggregation also have to be devised and investigated carefully. One of the approaches to ensure secure data aggregation is to use encrypted sensor data for processing, using homomorphic encryption. However, there are several homomorphic encryption algorithms for conventional networks and the feasibility of applying them in resource constrained environment remains an issue to be investigated. In this paper, we attempt at evaluating the performance of various privacy homomorphism algorithms in WSNs. Our work is motivated by identifying a homomorphic encryption algorithm for WSNs that offers security at the minimum overhead. To the best of our knowledge, ours is the first experimental evaluation of the state-of-the-art privacy homomorphic algorithms for WSNs.
منابع مشابه
Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route ag...
متن کاملSecure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model
Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. Concealed data aggregation (CDA) schemes that are based on the homomorphic characteristics of a...
متن کاملA New Framework for Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
In-network processing involves processing of the sensed data onthe-fly during the course of the communication to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. One of the approaches to ensure secure data aggregation is to use encr...
متن کاملRiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks
Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users' queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring struc...
متن کاملSecure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network
Wireless Sensor Networks is made of a large number of lowcost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011