2011
DOI: 10.1145/1921621.1921623
|View full text |Cite
|
Sign up to set email alerts
|

A security framework for privacy-preserving data aggregation in wireless sensor networks

Abstract: A formal treatment to the security of Concealed Data Aggregation (CDA) and the more general Private Data Aggregation (PDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA or PDA are still lacking. Standard security notions for public key encryption, including semantic security and indistinguishability against chosen ciphertext attacks, are refined to cover the multisender nature and aggregation functionality of CDA and PDA in the security model. The propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(17 citation statements)
references
References 32 publications
0
17
0
Order By: Relevance
“…The security model was sufficiently required for covering the most application scenarios and construction of data aggregation [23]. Lu et al presented an optimal allocation strategy for data aggregation in WSN.…”
Section: Related Workmentioning
confidence: 99%
“…The security model was sufficiently required for covering the most application scenarios and construction of data aggregation [23]. Lu et al presented an optimal allocation strategy for data aggregation in WSN.…”
Section: Related Workmentioning
confidence: 99%
“…www.ijacsa.thesai.org algorithm and of the plaintext and it is one of the inputs of the encryption algorithm.The ciphertext is the scrambled text produced as output. The decryption algorithm is the encryption algorithm run in reverse [6,2,7]. There are two main categories of private-key algorithms, namely block and stream encryption [8].…”
Section: #%Tgfvrand Decryption Keymentioning
confidence: 99%
“…Decryption is the process of converting data from encrypted format back to their original format [2]. Data encryption becomes an important issue when sensitive data are to be sent through a network where unauthorized users may attack the network.…”
Section: Introductionmentioning
confidence: 99%
“…A sensor is a simple, battery fuelled apparatus with required computational power and memory that is outfitted with distinguishing radio transmission units. WSNs are generally connected with the outside world through a computationally executable centre called the sink that is in like manner responsible for data gathering and data join [2,3]. Remote sensors need to talk with each other through remote transmission.…”
Section: Introductionmentioning
confidence: 99%