A new privacy homomorphism and applications
Information Processing Letters
Distributed Algorithms
SPINS: security protocols for sensor networks
Wireless Networks
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
Efficient and optimally secure in-network aggregation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Hi-index | 0.00 |
The proliferation of sensor networks provides a promising solution for a variety of ubiquitous data services, but it challenges the data security and privacy because of its unfavorable deployment nature of being prone to physical attacks with circumscribed source available. Considering the data redundancy, energy constraint, and security requirement, this paper proposed a secure data aggregation scheme which supports end-to-end encryption using privacy homomorphism as well as hop-by-hop verification using ECC based MAC in cluster based sensor networks. The analytic comparing results show that our scheme has higher resistance against eavesdropping and fabricating attacks at a little additional computational cost with higher connectivity.