Proceedings of the International Conference on Computer Information Systems and Industrial Applications

An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks

Authors
L.J Yang, C. Ding, M. Wu
Corresponding Author
L.J Yang
Available Online June 2015.
DOI
10.2991/cisia-15.2015.36How to use a DOI?
Keywords
wireless sensor networks; data aggregation; privacy preserving; integrity protection
Abstract

To address the contradiction between data aggregation and data security in wireless sensor networks, an integrity-assured concealed data aggregation scheme is proposed based on the privacy homomorphism and the aggregate message authentication code techniques. The proposed scheme provides both end-to-end privacy and data integrity in data aggregation for wireless sensor networks. Besides, it supports any type of aggregation functions since the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators. The performance analysis shows that the proposed scheme is efficient in computation and communication, and is feasible for resource limited sensor networks.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Computer Information Systems and Industrial Applications
Series
Advances in Computer Science Research
Publication Date
June 2015
ISBN
978-94-62520-72-1
ISSN
2352-538X
DOI
10.2991/cisia-15.2015.36How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - L.J Yang
AU  - C. Ding
AU  - M. Wu
PY  - 2015/06
DA  - 2015/06
TI  - An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks
BT  - Proceedings of the International Conference on Computer Information Systems and Industrial Applications
PB  - Atlantis Press
SP  - 136
EP  - 138
SN  - 2352-538X
UR  - https://doi.org/10.2991/cisia-15.2015.36
DO  - 10.2991/cisia-15.2015.36
ID  - Yang2015/06
ER  -