368
Views
17
CrossRef citations to date
0
Altmetric
Original Articles

Secure data aggregation in wireless sensor networks using homomorphic encryption

, &
Pages 690-702 | Received 26 Mar 2013, Accepted 01 Jan 2014, Published online: 08 Aug 2014

References

  • Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422. doi:10.1016/S1389-1286(01)00302-4
  • Bellifemine, F., Caire, G., Poggi, A., & Rimassa, G. (2008). JADE: A software framework for developing multi-agent applications. Lessons learned. Information and Software Technology, 50(1–2), 10–21. doi:10.1016/j.infsof.2007.10.008
  • Çam, H., Özdemir, S., Nair, P., Muthuavinashiappan, D., & Ozgur Sanli, H. (2006). Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications, 29(4), 446–455. doi:10.1016/j.comcom.2004.12.029
  • Carr, H. H. (2007). Safe wireless practices. Information Systems Management, 24(4), 299–304. doi:10.1080/10580530701586003
  • Chen, M., Kwon, T., Yuan, Y., & Leung, V. (2006). Mobile agent based wireless sensor networks. Journal of Computers, 1(1), 14–21. doi:10.4304/jcp.1.1.14-21
  • Chen, M., Yang, L. T., Kwon, T., Zhou, L., & Jo, M. (2011). Itinerary planning for energy-efficient agent communications in wireless sensor networks. IEEE Transactions on Vehicular Technology, 60(7), 3290–3299. doi:10.1109/TVT.2011.2134116
  • Domingo-Ferrer, J. (2002). A provably secure additive and multiplicative privacy homomorphism*. In A. H. Chan & V. D. Gligor (Eds.), Information security (pp. 471–483). Berlin: Springer.
  • Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003, December, 1–5). A witness-based approach for data fusion assurance in wireless sensor networks. In Global telecommunications conference, 2003. GLOBECOM’03 (Vol. 3, pp. 1435–1439). San Francisco, CA: IEEE.
  • Ganeriwal, S., & Srivastava, M. B. (2004, October 25). Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, Washington, DC (pp. 66–77). ACM.
  • Hu, L., & Evans, D. (2003, January). Secure aggregation for wireless networks. In Proceedings 2003 symposium on applications and the Internet workshops (pp. 384–391). Orlando, FL: IEEE.
  • Jsang, A., & Ismail, R. (2002, June 17–19). The beta reputation system. Proceedings of the 15th bled electronic commerce conference, Bled (pp. 41–55).
  • Konstantopoulos, C., Mpitziopoulos, A., Gavalas, D., & Pantziou, G. (2010). Effective determination of mobile agent itineraries for data aggregation on sensor networks. IEEE Transactions on Knowledge and Data Engineering, 22(12), 1679–1693. doi:10.1109/TKDE.2009.203
  • Lin, Y. H., Chang, S. Y., & Sun, H. M. (2013). CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1471–1483. doi:10.1109/TKDE.2012.94
  • Mahimkar, A., & Rappaport, T. S. (2004, December). Securedav: A secure data aggregation and verification protocol for sensor networks. In Global telecommunications conference, 2004. GLOBECOM’04 (Vol. 4, pp. 2175–2179). Dallas, TX: IEEE.
  • Newsome, J., Shi, E., Song, D., & Perrig, A. (2004, April). The Sybil attack in sensor networks: Analysis & defenses. In Proceedings of the 3rd international symposium on information processing in sensor networks (pp. 259–268). Berkeley, CA: ACM.
  • Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In Advances in cryptology – EUROCRYPT’98 (pp. 308–318). Berlin: Springer.
  • Ozdemir, S. (2007a, July). Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In IEEE international conference on pervasive services (pp. 165–168). White Plains, NY: IEEE.
  • Ozdemir, S. (2007b). Secure and reliable data aggregation for wireless sensor networks. In Ubiquitous computing systems (pp. 102–109). Berlin: Springer.
  • Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534. doi:10.1023/A:1016598314198
  • Peter, S., Westhoff, D., & Castelluccia, C. (2010). A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 7(1), 20–34. doi:10.1109/TDSC.2008.23
  • Przydatek, B., Song, D., & Perrig, A. (2003, November). SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 255–265). Los Angeles, CA: ACM.
  • Rajagopalan, R., & Varshney, P. K. (2006). Data aggregation techniques in sensor networks: A survey. IEEE Communications Surveys & Tutorials, 8(4), 48–63. doi:10.1109/COMST.2006.283821
  • Sahni, S., & Xu, X. (2005). Algorithms for wireless sensor networks. International Journal of Distributed Sensor Networks, 1(1), 35–56. doi:10.1080/15501320490886323
  • Sanli, H. O., Ozdemir, S., & Cam, H. (2004, September 26–29). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In IEEE 60th conference on Vehicular technology, 2004 (Vol. 7, pp. 4650–4654). IEEE. doi:10.1109/VETECF.2004.1404972
  • Sharmila, S., & Umamaheswari, G. (2013). Node ID based detection of Sybil attack in mobile wireless sensor network. International Journal of Electronics, 100(10), 1441–1454. doi:10.1080/00207217.2012.743093
  • Vijayalakshmi, S. R., & Muruganand, S. (2012). Real-time monitoring of ubiquitous wireless ECG sensor node for medical care using zigbee. International Journal of Electronics, 99(1), 79–89. doi:10.1080/00207217.2011.609981
  • Westhoff, D., Girao, J., & Acharya, M. (2006). Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(10), 1417–1431. doi:10.1109/TMC.2006.144
  • Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2007). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks, 5(1), 100–111. doi:10.1016/j.adhoc.2006.05.009
  • Yang, Y., Wang, X., Zhu, S., & Cao, G. (2006, May). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing (pp. 356–367). Florence: ACM.
  • Zhang, T., He, J., & Zhang, Y. (2012). Secure sensor localization in wireless sensor networks based on neural network. International Journal of Computational Intelligence Systems, 5(5), 914–923. doi:10.1080/18756891.2012.733229
  • Zhang, W., Liu, Y., Das, S. K., & De, P. (2008). Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive and Mobile Computing, 4(5), 658–680. doi:10.1016/j.pmcj.2008.05.005

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.