Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem
Abstract
A new method of lossless Secure Data Aggregation for Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the popular Chinese Remainder theorem. Here, an ‘Augmented Chinese Remainder System’ is introduced that incorporates additional features to enforce a higher level of security to the aggregated data. The scheme provides inbuilt signature verification and eliminates the need for separate data validation algorithms. The method achieves data integrity and authentication simultaneously in addition to data aggregation for the data forwarded from the Cluster Head to the Base Station. The aggregate contains the entire individual data in the encrypted form and the receiver de-aggregates it to get the original data in full. The Augmented Chinese Remainder System can be extended to secure Multi-level Data Aggregation for WSN.References
S. Ozdemir and Y. Xiao, “Secure data aggregation in
Wireless sensor networks : a comprehensive overview,” Computer
Networks, Vol. 53, No.12, pp. 2022–2037, Aug.2009.
K. Akkaya, M. Demirbas and R.S. Aygun, “The Impact of Data
Aggregation on the Performance of Wireless Sensor Networks”,
Wiley Wireless Communication and Mobile Computing (WCMC)
Journal, Vol. 8, pp. 171–193, 2008.
M. Elhoseny, H. Elminir, A. Riad and X. Yuan, “A secure data
routing schema for WSN using elliptic curve cryptography and
homomorphic encryption,” Journal King Saud university, Computer
and Information Science, Vol. 26, No. 3, pp. 262–275, 2015.
J. Boga, M. S. Huque1 and S. B. Saheb, “An Approach to Secure
Data Aggregation in Curve Cryptography) Scheme,” International
Journals of Advanced Research in Computer Science and Software
Engineering, Vol. 7, No. 7, pp. 263–267, 2017.
M. B. Omar Rafik and F. Mohammed, “Fast and secure
implementation of ECC-based concealed data aggregation in WSN,”
Global Information Infrastructure Symposium. GIIS, Toronto, pp.
–7, 2013.
Q. Zhou, G. Yang and L. He, “A secure enhanced data aggregation
based on ECC in wireless sensor network,” Sensor Journal, Vol. 14,
No. 4, pp. 6701–6721, 2014.
Ara M. Al-Rodhaan, Y. Tian and A. Al-Dhelaan, “A Secure Privacy-
Preserving Data ggregation Scheme Based on Bilinear ElGamal
Cryptosystem for Remote Health Monitoring Systems,” IEEE
Access, Vol. 5, pp. 12601–12617, 2017.
D. Boneh, C. Gentry, B. Lynn and H. Shacham, “Aggregate and
verifiably encrypted signatures from bilinear maps,” Proceedings of
EUROCRYPT 2003, Vol. 2656 of LNCS. Springer, Boston, MA, USA,
pp. 416–432, 2003.
J. L. Tsai, “A New Efficient Certificate less Short Signature Scheme
Using Bilinear Pairings,” IEEE Systems Journal, Vol.11, No. 4,
pp. 2395– 2402, Dec.2017.
B.Waters, “Efficient Identity-Based Encryption without Random
Oracles,” Springer Berlin Heidelberg Berlin, Heidelberg,
pp. 114– 127, 2005.
C. Jie, S. Lili, Z. Hong, X. Yan and L Lu, “Data aggregation with end-
to-end confidentiality and integrity for large-scale wireless sensor
networks,” Peer-to-Peer Networking Applications, Vol.11, No.5,
pp. 1022–1037, 2018.
J. Jose, J. Jose, and H. Muhammed Ilyas, “Symmetric concealed
data aggregation techniques in wireless sensor networks using
Privacy Homomorphism: A review,” International Conference on
Information Science (ICIS), pp. 275–280, 2016.
K. Parmar, C. Devesh and Jinwala, “Symmetric-Key Based
Homomorphic Primitives for End-to-End Secure Data Aggregation in
Wireless Sensor Networks,” Journal of Information Security Vol. 6,
pp.38–50, 2015.
K. Shah and D. C. Jinwala, “A secure expansive aggregation in
Wireless Sensor Networks for linear infrastructure,” IEEE Region 10
Symposium (TENSYMP), pp. 207–212, 2016.
E. Choudhari, K. D. Bodhe and S. M. Mundada, “Secure data
aggregation in WSN using iterative filtering algorithm,”
International Conference on Innovative Mechanisms for Industry
Applications (ICIMIA). pp. 1–5, 2017.
M. Mansouri, L. Khoukhi, H. Nounou and M. Nounou, “Secure and
robust clustering for uantized target tracking in wireless sensor
networks,” Journal of Communications and Networks, Vol. 15,
No. 2, pp. 164–172, 2013.
G. Priyanka, Padmane and K. G. Bagde, “Secure Data Aggregation
in Wireless Sensor Network using BECAN Scheme,” International
Journal of Advanced Research in Computer and Communication
Engineering, Vol. 4, No. 10, pp. 205–209, 2015.
S. Nath, P. B. Gibbons, S. Seshan and Z. R. Anderson, “Synopsis
Diffusion for Robust Aggregation in Sensor Networks,” Proceedings
of the 2nd International Conference on Embedded
Networked Sensor Systems (SenSys ’04), ACM, New York, NY,
USA, pp. 250–262, 2004.
S. Roy, M. Conti, S. Setia and S. Jajodia, “Secure Data Aggregation
in Wireless Sensor Networks: Filtering out the Attacker’s Impact,”
IEEE Transactions on Information Forensics and Security, Vol. 9,
No. 4, pp. 681–694, , 2014.
B. Przydatek, D. Song, and A. Perrig, “Secure information
aggregation in sensor networks,” Proceedings of ACM SenSys, ACM,
Los Angeles, CA, USA, pp. 255–265, 2003.
R. Dian-xu, Z. Xiao-Guang and Li Li-jun, “Safety Data Fusion
Algorithm in Wireless Sensor Network, Journal of Networks, Vol. 8,
No. 5, pp. 1121–1129, 2013.
J. Grossschadl, “The Chinese Remainder Theorem and its
application in a high-speed RSA crypto chip,” Computer Security
Applications, ACSAC, 16th Annual Conference. pp. 384–393, 2000.
Y. Mo and S. Li, “Base Extent Optimization for RNS Montgomery
Algorithm,” IEEE Trustcom/BigDataSE/ICESS, PP. 1004–1009,
N. Shi, Z. Hou, M. Tan, K. Shao and X. Zhu, “A threshold encryption
scheme without a dealer based on Chinese remainder theorem,”
IEEE 9th International Conference on Communication Software and
Network ICCSN), PP. 90–96, 2017.
W. Stalling (2010), “Cryptography and Network Security : Principles
and Practices(3rd. ed.)”, Prentice-Hall, NJ, USA, 2019.
V. Kumar and N. Srivastava, “Chinese Remainder Theorem based
Full Homomorphic Encryption over Integers,” International Journal
of Applied Engineering Research (ISSN0973-4562), Vol. 14, No. 2,
(Special Issue), pp. 203-208.
Y.H. Ku and X. Sun, “The Chinese remainder theorem,” Journal
Franklin Institute, Vol. 329, pp. 93–97, 1992.
D. E. Knuth, Semi-numerical Algorithms (3rd ed.), The Art of
Computer Programming,” Vol.2. Addison-Wesley, Reading, MA,
X. Zheng, C.T. Huang and M. Matthews, “Chinese remainder
theorem based group key management,” Proceedings of the 45th
annual southeast regional conference. ACM–SE45, New York, NY,
pp. 266–271, 2007.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 International Journal of Electronics and Telecommunications
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.