Abstract
Data aggregation is one of the main purposes for which sensor networks are developed. However, to secure the data aggregation schemes, several security-related issues have raised including the need for efficient implementations of cryptographic algorithms, secure key management schemes' design and many others. Several works has been introduced in this direction and succeeded to some extent in providing relatively efficient solutions. Yet, one of the questions to be answered is that, can we still aggregate the sensed data with less security-related computation while maintaining a marginal level of security and accuracy? In this paper, we consider data randomization as a possible approach for data aggregation. Since the individual single sensed record is not of a big concern when using data for aggregation, we show how data randomization can explicitly hide the exact single data records to securely exchange them between nodes. To improve the security and accuracy of this approach, we introduce a hybrid scheme that uses the cryptographic approach for a fraction of nodes. We study the efficiency of our schemes in terms of the estimate accuracy and the overhead.
Original language | English |
---|---|
Title of host publication | Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings |
Pages | 338-351 |
Number of pages | 14 |
DOIs | |
State | Published - 2008 |
Event | 5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008 - Oslo, Norway Duration: 23 Jun 2008 → 25 Jun 2008 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 5061 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 5th International Conference on Ubiquitous Intelligence and Computing, UIC 2008 |
---|---|
Country/Territory | Norway |
City | Oslo |
Period | 23/06/08 → 25/06/08 |
Bibliographical note
Funding Information:This work was supported by the IT R&D program of MIC/IITA. [2005-Y-001-04, Development of next generation security technology].
Keywords
- Computation efficiency
- Data aggregation
- Data randomization
- Experimental justification
- Security
- Sensor network