2009
DOI: 10.1145/1525856.1525858
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and provably secure aggregation of encrypted data in wireless sensor networks

Abstract: Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
254
0
2

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 289 publications
(256 citation statements)
references
References 24 publications
0
254
0
2
Order By: Relevance
“…As suggested in [17,20], it can be implemented with HMAC, where f s (t) is the HMAC of t with s as the key. Function h maps the output of f s to a uniform random value in [0, M − 1].…”
Section: Encryption Methods Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…As suggested in [17,20], it can be implemented with HMAC, where f s (t) is the HMAC of t with s as the key. Function h maps the output of f s to a uniform random value in [0, M − 1].…”
Section: Encryption Methods Setupmentioning
confidence: 99%
“…There are many existing works (e.g., [17]) on privacy-preserving data aggregation, but most of them assume a trusted aggregator. Shi et al [18] proposed an aggregation scheme for mobile sensing, but the scheme does not consider time-series data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of techniques that compute the sum of multiple private inputs include [7,5], where encryption is done by modular addition (each player simply adds its key to the plaintext) and aggregation is very efficient, also performed via addition. However, this approach assumes a semi-trusted aggregator who knows the sum of all keys (for each reporting interval) and can thus decrypt the aggregated value by subtraction.…”
Section: Related Workmentioning
confidence: 99%
“…A very simple, yet elegant approach for privacy-preserving multi-party computation is proposed by Chaum [20]. Castellucia et al have described how inexpensive encryption operations may be exploited in aggregation schemes for WSNs to ensure data privacy [5].…”
Section: Related Workmentioning
confidence: 99%