Introduction to finite fields and their applications
Introduction to finite fields and their applications
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
IEEE Transactions on Mobile Computing
Secure data aggregation with multiple encryption
EWSN'07 Proceedings of the 4th European conference on Wireless sensor networks
A secure and resilient WSN roadside architecture for intelligent transport systems
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Modified clock-controlled alternating step generators
Computer Communications
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
Information Fusion
An attack on privacy preserving data aggregation protocol for wireless sensor networks
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Protection of consumer data in the smart grid compliant with the German smart metering guideline
Proceedings of the first ACM workshop on Smart energy grid security
Secure and energy-efficient data aggregation for wireless sensor networks
International Journal of Mobile Network Design and Innovation
Hi-index | 0.25 |
The use of converge-cast traffic and in-network processing to minimize the amount of transmitted data is a frequently used approach to increase the lifetime of a wireless sensor network (WSN). Consequently, when aiming at security for WSNs, one has to focus primarily on protecting this type of traffic. Some recent proposals support the encryption of converge-cast traffic with in-network processing. However, they either require the transmission of the sensors' IDs, creating additional data overhead linear in the number of sensors, or require an elaborate key pre-distribution mechanism. In this paper we propose a solution for end-to-end encryption of converge-cast traffic with a simple key pre-distribution scheme causing additional data only logarithmic in the number of sensors. The scheme is robust with respect to unreliable channels, exhausted nodes, and routing flexibility. It supports refreshing the keys at the nodes, which has so far been fully neglected.