Handbook of Applied Cryptography
Handbook of Applied Cryptography
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Mobile Computing
Datalink streaming in wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
The impact of data aggregation on the performance of wireless sensor networks
Wireless Communications & Mobile Computing
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Energy-efficient secure pattern based data aggregation for wireless sensor networks
Computer Communications
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
IEEE Transactions on Dependable and Secure Computing
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Designing secure sensor networks
IEEE Wireless Communications
IEEE Communications Magazine
Hi-index | 0.00 |
In wireless sensor networks, performing data aggregation while preserving data confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure data aggregation schemes have been proposed to seamlessly integrate confidentiality and data aggregation. However, these schemes do not provide data integrity or allow hierarchical data aggregation if more than one encryption key is used in the network. This paper presents a novel integrity protecting hierarchical concealed data aggregation protocol that allows the aggregation of data packets that are encrypted with different encryption keys. In addition, during the decryption of aggregated data, the base station is able to classify the encrypted and aggregated data based on the encryption keys. The proposed data aggregation scheme employs an elliptic curve cryptography-based homomorphic encryption algorithm to offer data integrity and confidentiality along with hierarchical data aggregation.