A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor NetworksReportar como inadecuado




A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

1

Institute of Advanced Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, China

2

School of Computer Science & Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, China

3

School of Computer & Information Engineering, Chuzhou University, Chuzhou 239000, China





*

Authors to whom correspondence should be addressed.



Abstract Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks WSNs. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography SEDA-ECC. The design of SEDA-ECC is based on the principles of privacy homomorphic encryption PH and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station BS by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes. View Full-Text

Keywords: wireless sensor networks; data aggregation; Elliptic Curve Cryptography ECC; data integrity; data privacy wireless sensor networks; data aggregation; Elliptic Curve Cryptography ECC; data integrity; data privacy





Autor: Qiang Zhou 1,2,3,* , Geng Yang 2,* and Liwen He 1

Fuente: http://mdpi.com/



DESCARGAR PDF




Documentos relacionados