2015 International Wireless Communications and Mobile Computing Conference (IWCMC) 2015
DOI: 10.1109/iwcmc.2015.7289252
|View full text |Cite
|
Sign up to set email alerts
|

A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks

Abstract: Due to the characteristics of resource-constrained in wireless sensor networks (WSNs), energy consumption is a major concern. Data aggregation is an important method to reduce the energy consumption and communication overhead ; however, it suffers from the security problems of data integrity. In fact, designing integrity schemes for data aggregation is an imperative problem for securing WSNs. In this paper, we propose a secure data aggregation based on homomorphic MAC scheme that provide efficient secure data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…The aggregator is unable to verify the validity of the packets received which is a vulnerability that can be exploited by the attacker to inject its malicious packets. To solve this problem homomorphic MAC techniques have been proposed by Hayouni et al [5]. The schemes used two MACs for each encrypted message, one is MAC for data integrity and the second one is EMAC for MAC integrity.…”
Section: : Extrapolation To Recover Lost Submissionmentioning
confidence: 99%
See 2 more Smart Citations
“…The aggregator is unable to verify the validity of the packets received which is a vulnerability that can be exploited by the attacker to inject its malicious packets. To solve this problem homomorphic MAC techniques have been proposed by Hayouni et al [5]. The schemes used two MACs for each encrypted message, one is MAC for data integrity and the second one is EMAC for MAC integrity.…”
Section: : Extrapolation To Recover Lost Submissionmentioning
confidence: 99%
“…In computational cost (CC) we will analyze the algorithms based on the complexity of mathematical steps involved. The techniques proposed by Hayouni et al [5] has a very high CC because it involves three mathematical operations, first, each message is encrypted at source node using a key vector and mod operation. Mod operation includes repeated multiplication and reduction that has high CC.…”
Section: Computational Costmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, MAC assures for the data integrity of original message and Extended-MAC assures for the data integrity of different MACs. Their dependability ensures the detection of alterations in the data around the whole network [15].…”
Section: Data Integrity: Concept and Threatsmentioning
confidence: 99%
“…Authenticity is basically of two types: Source Authentication & Message Authentication where the former assures the identity of the user and the latter assures the reception of unaltered data. In order to ensure confidentiality and authenticity, various encryption and decryption algorithms were applied in the past [15].…”
Section: Introductionmentioning
confidence: 99%