Title: Two security layers for hierarchical data aggregation in sensor networks

Authors: Jacques M. Bahi; Christophe Guyeux; Abdallah Makhoul

Addresses: Computer Science Laboratory, University of Franche-Comté, Rue Engel-Gros BP 527, France ' Computer Science Laboratory, University of Franche-Comté, Rue Engel-Gros BP 527, France ' Computer Science Laboratory, University of Franche-Comté, Rue Engel-Gros BP 527, France

Abstract: Due to resource restricted sensor nodes, it is important to minimise the amount of data transmission among sensor networks. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, as sensor networks are often deployed in untrusted and even hostile environments, sensor nodes are prone to node compromise attacks. Hence, an end-to-end secure aggregation approach is required to ensure a healthy data reception. In this paper, we propose two layers for secure data aggregation in sensor networks. Firstly, we provide an end-to-end encryption scheme that supports operations over cypher-text. It is based on elliptic curve cryptography that exploits a smaller key size, allows the use of higher number of operations on cypher-texts and prevents the distinction between two identical texts from their cryptograms. Secondly, we propose a new watermarking-based authentication that enables sensor nodes to ensure the identity of other nodes they are communicating with. Our experiments show that our hybrid approach of secure data aggregation enhances the security, significantly reduces computation and communication overhead, and can be practically implemented in on-the-shelf sensor platforms.

Keywords: wireless sensor networks; WSNs; authentication; confidentiality; secure data aggregation; homomorphic encryption; digital watermarking; network security; security layers; compromise attacks; elliptic curve cryptography; ECC; data transmission.

DOI: 10.1504/IJAACS.2014.065196

International Journal of Autonomous and Adaptive Communications Systems, 2014 Vol.7 No.3, pp.239 - 270

Published online: 29 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article