Data randomization for lightweight secure data aggregation in sensor network

Abedelaziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam Su Jho, Daehun Nyang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Data aggregation is one of the main purposes for which sensor networks are developed. However, to secure the data aggregation schemes, several security-related issues have raised including the need for efficient implementations of cryptographic algorithms, secure key management schemes' design and many others. Several works has been introduced in this direction and succeeded to some extent in providing relatively efficient solutions. Yet, one of the questions to be answered is that, can we still aggregate the sensed data with less security-related computation while maintaining a marginal level of security and accuracy? In this paper, we consider data randomization as a possible approach for data aggregation. Since the individual single sensed record is not of a big concern when using data for aggregation, we show how data randomization can explicitly hide the exact single data records to securely exchange them between nodes. To improve the security and accuracy of this approach, we introduce a hybrid scheme that uses the cryptographic approach for a fraction of nodes. We study the efficiency of our schemes in terms of the estimate accuracy and the overhead.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings
Pages338-351
Number of pages14
DOIs
StatePublished - 2008
Event5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008 - Oslo, Norway
Duration: 23 Jun 200825 Jun 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5061 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008
Country/TerritoryNorway
CityOslo
Period23/06/0825/06/08

Bibliographical note

Funding Information:
This work was supported by the IT R&D program of MIC/IITA. [2005-Y-001-04, Development of next generation security technology].

Keywords

  • Computation efficiency
  • Data aggregation
  • Data randomization
  • Experimental justification
  • Security
  • Sensor network

Fingerprint

Dive into the research topics of 'Data randomization for lightweight secure data aggregation in sensor network'. Together they form a unique fingerprint.

Cite this