SCRAP Header

Aggregation of Encrypted data in Wireless Sensor Networks for Secure Multi-Application Data

IJEECC Front Page

Generally, aggregative operations are algebraic, such as the addition or multiplication of received data, or statistical operation, such as a median, a minimum, or a maximum of a data set. It reduces a large amount of transmission is the most practical technique. Although data aggregation could significantly reduce transmission, it is vulnerable to some attacks. Some of the existing schemes do not provide secure counting. Thus, they may suffer from unauthorized aggregation attacks. We propose a new concealed data aggregation scheme extended from Boneh et al.’s homomorphic public encryption system. The proposed scheme has three contributions. First, it is designed for a multi application environment. The base station extracts application-specific data from aggregated cipher-texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations.
Keywords:Concealed data aggregation, elliptic curve cryptography, wireless sensor networks


  1. R. Min and A. Chandrakasan, “Energy-Efficient Communication for Ad-Hoc Wireless Sensor Networks,” Proc. Conf. Record of the 35th Asilomar Conf. Signals, Systems and Computers, vol.1, 2001.
  2. D. Boneh, E. Goh, and K. Nissim, “Evaluating 2-DNF Formulas on Ciphertexts,” Proc. Second Int’l Conf. Theory of Cryptography (TCC), vol. 3378, pp. 325-341, 2005.
  3. D. Westhoff, J. Girao, and M. Acharya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
  4. J. Girao, D. Westhoff, M. Schneider, N. Ltd, and G. Heidelberg, “CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’05), vol. 5, 2005.
  5. S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006.
  6. A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521 534, 2002.
  7. B. Iyer, C. Li, and S. Mehrotra, “Executing Sql over Encrypted Data in the Database-Service-Provider Model,” Proc. ACM SIGMOD Int’l Conf. Management of Data, pp. 216-227, 2002.