Energy efficient recoverable concealed data aggregation in wireless sensor networks

Concealed data aggregation (CDA) is important in wireless sensor networks, because it provides an energy efficient secure communication by allowing in network data aggregation on encrypted data. Privacy homomorphism (PH) based algorithms are the basis of CDA. However, it supports only a limited numb...

Full description

Saved in:
Bibliographic Details
Published in2013 International Conference on Emerging Trends in Computing, Communication and Nanotechnology pp. 322 - 329
Main Authors Jose, Josna, Kumar, S Manoj, Jose, Joyce
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2013
Subjects
Online AccessGet full text
ISBN9781467350372
1467350370
DOI10.1109/ICE-CCN.2013.6528517

Cover

More Information
Summary:Concealed data aggregation (CDA) is important in wireless sensor networks, because it provides an energy efficient secure communication by allowing in network data aggregation on encrypted data. Privacy homomorphism (PH) based algorithms are the basis of CDA. However, it supports only a limited number of aggregation functions. Recoverability of individual sensor readings from the concealed data aggregation result at the BS overcomes the limitation of PH based algorithms on aggregation function. Thus, it allows authentication and integrity checking. But this technique reduces the node energy due to the computation overhead of encryption, signature operation as well as the transfer of both. So a mechanism that saves the energy of sensor nodes is required. The proposed technique overcomes this by transmitting the difference data rather than raw data from sensor node to cluster head. This differential data transfer achieves more energy and bandwidth efficiency than the existing recoverable concealed data aggregation scheme. The proposed differential data based recoverable data aggregation scheme increases the network lifetime by avoiding the redundant data transfer from each sensor node. Thus, it reduces the transmission overhead in the secure communication.
ISBN:9781467350372
1467350370
DOI:10.1109/ICE-CCN.2013.6528517