Please use this identifier to cite or link to this item: https://doi.org/10.1145/1525856.1525858
DC FieldValue
dc.titleEfficient and provably secure aggregation of encrypted data in wireless sensor networks
dc.contributor.authorCastelluccia, C.
dc.contributor.authorChan, A.C.-F.
dc.contributor.authorMykletun, E.
dc.contributor.authorTsudik, G.
dc.date.accessioned2013-07-04T07:50:24Z
dc.date.available2013-07-04T07:50:24Z
dc.date.issued2009
dc.identifier.citationCastelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5 (3) : 1-36. ScholarBank@NUS Repository. https://doi.org/10.1145/1525856.1525858
dc.identifier.issn15504859
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39823
dc.description.abstractWireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity) is required. In this article, we propose a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data. Only one modular addition is necessary for ciphertext aggregation. The security of the scheme is based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. We show that aggregation based on this scheme can be used to efficiently compute statistical values, such as mean, variance, and standard deviation of sensed data, while achieving significant bandwidth savings. To protect the integrity of the aggregated data, we construct an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, also based on the indistinguishability property of PRFs.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1525856.1525858
dc.sourceScopus
dc.subjectAuthentication
dc.subjectCryptography
dc.subjectPrivacy
dc.subjectPseudorandom functions
dc.subjectSecure data aggregation
dc.subjectStream ciphers
dc.subjectWireless sensor networks
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1145/1525856.1525858
dc.description.sourcetitleACM Transactions on Sensor Networks
dc.description.volume5
dc.description.issue3
dc.description.page1-36
dc.identifier.isiut000267018200002
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.