Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Impact of Network Density on Data Aggregation in Wireless Sensor Networks
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
An efficient integrity-preserving scheme for hierarchical sensor aggregation
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure median computation in wireless sensor networks
Ad Hoc Networks
HICCUPS: health information collaborative collection using privacy and security
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
End-to-end aggregate authentication of time-series data
Proceedings of the first ACM workshop on Asia public-key cryptography
End-to-end aggregate authentication of time-series data
Proceedings of the first ACM workshop on Asia public-key cryptography
Hi-index | 0.00 |
We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating values. We proposes a construction that allows a group of participants to periodically upload authenticated data values to a data aggregator, such that the aggregator is able to derive an aggregate signature over the true aggregate result, but is unable to do so if any error is introduced into the aggregate result. To our knowledge, it is the first secure agggregate authentication scheme that achieves end-to-end security without resorting to additional communication or third parties. Our construction supports iterative aggregation thus it can be used in a networked environment where there exists multi-level of aggregators. Our construction is efficient in term of both computation and communication. Especially, the online computation cost of aggregate tag verification is constant and independent of the number of underlying individual signatures. We prove the security of our construction under the assumption of CDH problem.