Skip to main content

Exploring Homomorphic Encryption in Wireless Sensor Networks

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 251))

Abstract

The communication paradigm in the Wireless Sensor Networks (WSNs) relies on in network processing i.e. on-the-fly pre-processing of the data sensed by the sensors, on its way to the base station. However, the fallout of in-network processing is that the multihop communication used in WSNs has to be data-centric, unlike the route-centric communication used in conventional networks. This requires that the intermediate nodes have access to the data that jeopardizes the stringent end-to-end security requirements of typical security-critical applications. An approach that promises the combination of end-to-end security and in-network aggregation is Concealed Data Aggregation. In this paper, we discuss our attempts at investigating the feasibility of applying the provably secure homomorphic encryption schemes to the WSNs, within the constraints permissible and without sacrificing any security. Based on our empirical evaluation centered around defined performance metrics, we demonstrate that it is feasible to employ the proposed approach for WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2229–2230 (2008)

    Article  Google Scholar 

  3. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53(12), 2022–2037 (2009)

    Article  MATH  Google Scholar 

  4. Rajagopalan, R., Varshney, P.K.: Data aggregation techniques in sensor networks: a survey. IEEE Communications Surveys & Tutorials 8(4), 48–63 (2006)

    Article  Google Scholar 

  5. Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. Second ACM Conference on Embedded Networked Sensor Systems, pp. 162–175 (November 2004)

    Google Scholar 

  6. Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proc. Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117 (2005)

    Google Scholar 

  7. Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for wireless sensor networks. In: Proc. Fourth IEEE Consumer Communications and Networking Conference, pp. 192–196 (2007)

    Google Scholar 

  8. Fontaine, C., Galand, F.: A survey of Homomorphic encryption for Nonspecialists. EURASIP Journal on Information Security, articleno-15, 15:1–15:15 (2007)

    Google Scholar 

  9. Guangli, X., Xinmeng, C., Ping, Z., Jie, M.: A method of Homomorphic encryption. Wuhan University Journal of Natural Sciences 11(1), 181–184 (2006)

    Article  MATH  Google Scholar 

  10. Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wireless Communications 14(2), 70–87 (2007)

    Article  Google Scholar 

  11. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–177. Academic Press (1978)

    Google Scholar 

  12. Alzaid, H., Foo, E., Nieto, J.G.: Secure data aggregation in wireless sensor network: a survey. In: Proc. of the Sixth Australasian Conference on Information Security (AISC 2008), vol. 81, pp. 93–105 (2008)

    Google Scholar 

  13. Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Information Security Conference, pp. 471–483 (2002)

    Google Scholar 

  14. Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)

    Article  MATH  Google Scholar 

  15. Sander, T., Tschudin, C.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111–123. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  17. Sander, T., Tschudin, C.: Towards mobile cryptography. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 215–224. IEEE computer society press (1998)

    Google Scholar 

  18. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. SIGPLAN Not. 35(11), 93–104 (2000)

    Article  Google Scholar 

  19. Levis, P., Lee, N.: TOSSIM: A Simulator for TinyOS Networks (September 17, 2003), http://today.cs.berkeley.edu/tos/tinyos-1.x/doc/nido.pdf

  20. Titzer, B.L., Lee, D., Palsberg, J.: Avrora: Scalable sensor network simulation with precise timing. In: Proc. 4th International Symposium on Information Processing In Sensor Networks (IPSN), articleno-67 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Patel, B., Jinwala, D. (2011). Exploring Homomorphic Encryption in Wireless Sensor Networks. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics