A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Data obfuscation with network coding
Computer Communications
An attack on privacy preserving data aggregation protocol for wireless sensor networks
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Secure and energy-efficient data aggregation for wireless sensor networks
International Journal of Mobile Network Design and Innovation
Hi-index | 0.00 |
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages are 1) neither keys nor plaintext is available at aggregating nodes, 2) the overall energy consumption of the backbone can be reduced, 3) the system is more flexible with respect to changing routes, and finally 4) the overall system security increases. We provide a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.