Next Article in Journal
Modeling and Manufacturing of a Micromachined Magnetic Sensor Using the CMOS Process without Any Post-Process
Previous Article in Journal
Optimization of Dengue Immunoassay by Label-Free Interferometric Optical Detection Method
Article Menu

Export Article

Open AccessArticle
Sensors 2014, 14(4), 6701-6721; doi:10.3390/s140406701

A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

1,2,3,* , 2,* and 1
1
Institute of Advanced Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, China
2
School of Computer Science & Technology, Nanjing University of Posts & Telecommunications, Nanjing 210046, China
3
School of Computer & Information Engineering, Chuzhou University, Chuzhou 239000, China
*
Authors to whom correspondence should be addressed.
Received: 16 December 2013 / Revised: 24 March 2014 / Accepted: 8 April 2014 / Published: 11 April 2014
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [622 KB, uploaded 21 June 2014]   |  

Abstract

Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC). The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH) and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS) by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes. View Full-Text
Keywords: wireless sensor networks; data aggregation; Elliptic Curve Cryptography (ECC); data integrity; data privacy wireless sensor networks; data aggregation; Elliptic Curve Cryptography (ECC); data integrity; data privacy
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Zhou, Q.; Yang, G.; He, L. A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks. Sensors 2014, 14, 6701-6721.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top