Please use this identifier to cite or link to this item:
https://doi.org/10.1145/1525856.1525858
DC Field | Value | |
---|---|---|
dc.title | Efficient and provably secure aggregation of encrypted data in wireless sensor networks | |
dc.contributor.author | Castelluccia, C. | |
dc.contributor.author | Chan, A.C.-F. | |
dc.contributor.author | Mykletun, E. | |
dc.contributor.author | Tsudik, G. | |
dc.date.accessioned | 2013-07-04T07:50:24Z | |
dc.date.available | 2013-07-04T07:50:24Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5 (3) : 1-36. ScholarBank@NUS Repository. https://doi.org/10.1145/1525856.1525858 | |
dc.identifier.issn | 15504859 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/39823 | |
dc.description.abstract | Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity) is required. In this article, we propose a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data. Only one modular addition is necessary for ciphertext aggregation. The security of the scheme is based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. We show that aggregation based on this scheme can be used to efficiently compute statistical values, such as mean, variance, and standard deviation of sensed data, while achieving significant bandwidth savings. To protect the integrity of the aggregated data, we construct an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, also based on the indistinguishability property of PRFs. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1525856.1525858 | |
dc.source | Scopus | |
dc.subject | Authentication | |
dc.subject | Cryptography | |
dc.subject | Privacy | |
dc.subject | Pseudorandom functions | |
dc.subject | Secure data aggregation | |
dc.subject | Stream ciphers | |
dc.subject | Wireless sensor networks | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1145/1525856.1525858 | |
dc.description.sourcetitle | ACM Transactions on Sensor Networks | |
dc.description.volume | 5 | |
dc.description.issue | 3 | |
dc.description.page | 1-36 | |
dc.identifier.isiut | 000267018200002 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.