A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Multicast Networking and Applications
Multicast Networking and Applications
Trapdooring Discrete Logarithms on Elliptic Curves over Rings
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
IEEE Transactions on Mobile Computing
Scalability and security in biased many-to-one communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure many-to-one symbol transmission for implementation on smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Secure and scalable many-to-one symbol transmission for sensor networks
Computer Communications
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks
ICESS '08 Proceedings of the 2008 International Conference on Embedded Software and Systems
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Secure acknowledgment of multicast messages in open peer-to-peer networks
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Securing communication trees in sensor networks
ALGOSENSORS'06 Proceedings of the Second international conference on Algorithmic Aspects of Wireless Sensor Networks
Aggregated hierarchical multicast-a many-to-many communication paradigm using programmable networks
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Information fusion in data privacy: A survey
Information Fusion
Hi-index | 0.00 |
In multicast communication, a single source transmits the same content to a large amount of receivers. This kind of communication is usually represented following a tree model where the root of the tree is the multicast source and the leaves are the receivers. Scalability problems arise when the root needs to collect data (sensor information, metering data, etc.) from the leaves. This results in a many-to-one (leaf-to-root) communication. The matter is further complicated if there are security requirements on the leaf-to-root traffic. In this paper we present a method for secure and scalable many-to-one lossy transmission based on asymmetric homomorphisms which enables the root of the tree to compute any mathematical function (e.g. minimum, maximum, average, ... ) on the data sent by the leaves. Our proposal preserves the confidentiality of those data. Authentication is guaranteed in the sense that only authorized nodes can participate in the protocol. Integrity against compromised leaves is also achieved. In the case of a compromised intermediate node which colludes with a compromised leave, they can only cause a limited deviation in the final aggregate value.