Proceedings of the International Conference on Computer Information Systems and Industrial Applications

An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks

Authors
L.J Yang, C. Ding, M. Wu
Corresponding Author
L.J Yang
Available Online June 2015.
DOI
https://doi.org/10.2991/cisia-15.2015.36How to use a DOI?
Keywords
wireless sensor networks; data aggregation; privacy preserving; integrity protection
Abstract
To address the contradiction between data aggregation and data security in wireless sensor networks, an integrity-assured concealed data aggregation scheme is proposed based on the privacy homomorphism and the aggregate message authentication code techniques. The proposed scheme provides both end-to-end privacy and data integrity in data aggregation for wireless sensor networks. Besides, it supports any type of aggregation functions since the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators. The performance analysis shows that the proposed scheme is efficient in computation and communication, and is feasible for resource limited sensor networks.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
International Conference on Computer Information Systems and Industrial Applications
Part of series
Advances in Computer Science Research
Publication Date
June 2015
ISBN
978-94-62520-72-1
DOI
https://doi.org/10.2991/cisia-15.2015.36How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - L.J Yang
AU  - C. Ding
AU  - M. Wu
PY  - 2015/06
DA  - 2015/06
TI  - An Integrity-Assured Concealed Data Aggregation Scheme for Wireless Sensor Networks
BT  - International Conference on Computer Information Systems and Industrial Applications
PB  - Atlantis Press
UR  - https://doi.org/10.2991/cisia-15.2015.36
DO  - https://doi.org/10.2991/cisia-15.2015.36
ID  - Yang2015/06
ER  -