Evaluating Homomorphic Encryption Algorithms for Privacy in Wireless Sensor Networks

نویسندگان

  • Vivaksha Jariwala
  • Devesh Jinwala
چکیده

The Wireless Sensor Networks (WSNs) consist of the sensor nodes those are severely resource constrained. Hence, the protocols devised for the WSNs employ every possible means of optimizing the associated overhead.The WSNs typically, employ in-network processing that is largely based on the data aggregation operations that aggregate the data into a compact representation for further transmission. However, when aggregating a number of different data packets, the integrity of the data values used for aggregation as well as the security of the aggregator node itself, assume prime importance. Even otherwise, due to the ubiquitous and pervasive deployment of the sensor nodes on one hand and due to the resource intensive nature of security algorithms, it is challenging to devise the security protocols for WSNs. Consequently, the protocols for ensuring secure data aggregation also have to be devised and investigated carefully. One of the approaches to ensure secure data aggregation is to use encrypted sensor data for processing, using homomorphic encryption. However, there are several homomorphic encryption algorithms for conventional networks and the feasibility of applying them in resource constrained environment remains an issue to be investigated. In this paper, we attempt at evaluating the performance of various privacy homomorphism algorithms in WSNs. Our work is motivated by identifying a homomorphic encryption algorithm for WSNs that offers security at the minimum overhead. To the best of our knowledge, ours is the first experimental evaluation of the state-of-the-art privacy homomorphic algorithms for WSNs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks

In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route ag...

متن کامل

Secure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model

Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. Concealed data aggregation (CDA) schemes that are based on the homomorphic characteristics of a...

متن کامل

A New Framework for Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks

In-network processing involves processing of the sensed data onthe-fly during the course of the communication to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. One of the approaches to ensure secure data aggregation is to use encr...

متن کامل

RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks

Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users' queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring struc...

متن کامل

Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network

Wireless Sensor Networks is made of a large number of lowcost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011