Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem

Authors

  • Sanu Thomas School of Technology and Applied Science Pullarikkunnu Campus Mallooseery, Kottayam Kerala India
  • Thomaskutty Mathew Faculty of School of Science, GITAM University, Bengaluru, Karnataka

Abstract

A new method of lossless Secure Data Aggregation for Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the popular Chinese Remainder theorem. Here, an ‘Augmented Chinese Remainder System’ is introduced that incorporates additional features to enforce a higher level of security to the aggregated data. The scheme provides inbuilt signature verification and eliminates the need for separate data validation algorithms. The method achieves data integrity and authentication simultaneously in addition to data aggregation for the data forwarded from the Cluster Head to the Base Station. The aggregate contains the entire individual data in the encrypted form and the receiver de-aggregates it to get the original data in full. The Augmented Chinese Remainder System can be extended to secure Multi-level Data Aggregation for WSN.

Author Biography

Sanu Thomas, School of Technology and Applied Science Pullarikkunnu Campus Mallooseery, Kottayam Kerala India

Associate Professor

Computer Science

References

S. Ozdemir and Y. Xiao, “Secure data aggregation in

Wireless sensor networks : a comprehensive overview,” Computer

Networks, Vol. 53, No.12, pp. 2022–2037, Aug.2009.

K. Akkaya, M. Demirbas and R.S. Aygun, “The Impact of Data

Aggregation on the Performance of Wireless Sensor Networks”,

Wiley Wireless Communication and Mobile Computing (WCMC)

Journal, Vol. 8, pp. 171–193, 2008.

M. Elhoseny, H. Elminir, A. Riad and X. Yuan, “A secure data

routing schema for WSN using elliptic curve cryptography and

homomorphic encryption,” Journal King Saud university, Computer

and Information Science, Vol. 26, No. 3, pp. 262–275, 2015.

J. Boga, M. S. Huque1 and S. B. Saheb, “An Approach to Secure

Data Aggregation in Curve Cryptography) Scheme,” International

Journals of Advanced Research in Computer Science and Software

Engineering, Vol. 7, No. 7, pp. 263–267, 2017.

M. B. Omar Rafik and F. Mohammed, “Fast and secure

implementation of ECC-based concealed data aggregation in WSN,”

Global Information Infrastructure Symposium. GIIS, Toronto, pp.

–7, 2013.

Q. Zhou, G. Yang and L. He, “A secure enhanced data aggregation

based on ECC in wireless sensor network,” Sensor Journal, Vol. 14,

No. 4, pp. 6701–6721, 2014.

Ara M. Al-Rodhaan, Y. Tian and A. Al-Dhelaan, “A Secure Privacy-

Preserving Data ggregation Scheme Based on Bilinear ElGamal

Cryptosystem for Remote Health Monitoring Systems,” IEEE

Access, Vol. 5, pp. 12601–12617, 2017.

D. Boneh, C. Gentry, B. Lynn and H. Shacham, “Aggregate and

verifiably encrypted signatures from bilinear maps,” Proceedings of

EUROCRYPT 2003, Vol. 2656 of LNCS. Springer, Boston, MA, USA,

pp. 416–432, 2003.

J. L. Tsai, “A New Efficient Certificate less Short Signature Scheme

Using Bilinear Pairings,” IEEE Systems Journal, Vol.11, No. 4,

pp. 2395– 2402, Dec.2017.

B.Waters, “Efficient Identity-Based Encryption without Random

Oracles,” Springer Berlin Heidelberg Berlin, Heidelberg,

pp. 114– 127, 2005.

C. Jie, S. Lili, Z. Hong, X. Yan and L Lu, “Data aggregation with end-

to-end confidentiality and integrity for large-scale wireless sensor

networks,” Peer-to-Peer Networking Applications, Vol.11, No.5,

pp. 1022–1037, 2018.

J. Jose, J. Jose, and H. Muhammed Ilyas, “Symmetric concealed

data aggregation techniques in wireless sensor networks using

Privacy Homomorphism: A review,” International Conference on

Information Science (ICIS), pp. 275–280, 2016.

K. Parmar, C. Devesh and Jinwala, “Symmetric-Key Based

Homomorphic Primitives for End-to-End Secure Data Aggregation in

Wireless Sensor Networks,” Journal of Information Security Vol. 6,

pp.38–50, 2015.

K. Shah and D. C. Jinwala, “A secure expansive aggregation in

Wireless Sensor Networks for linear infrastructure,” IEEE Region 10

Symposium (TENSYMP), pp. 207–212, 2016.

E. Choudhari, K. D. Bodhe and S. M. Mundada, “Secure data

aggregation in WSN using iterative filtering algorithm,”

International Conference on Innovative Mechanisms for Industry

Applications (ICIMIA). pp. 1–5, 2017.

M. Mansouri, L. Khoukhi, H. Nounou and M. Nounou, “Secure and

robust clustering for uantized target tracking in wireless sensor

networks,” Journal of Communications and Networks, Vol. 15,

No. 2, pp. 164–172, 2013.

G. Priyanka, Padmane and K. G. Bagde, “Secure Data Aggregation

in Wireless Sensor Network using BECAN Scheme,” International

Journal of Advanced Research in Computer and Communication

Engineering, Vol. 4, No. 10, pp. 205–209, 2015.

S. Nath, P. B. Gibbons, S. Seshan and Z. R. Anderson, “Synopsis

Diffusion for Robust Aggregation in Sensor Networks,” Proceedings

of the 2nd International Conference on Embedded

Networked Sensor Systems (SenSys ’04), ACM, New York, NY,

USA, pp. 250–262, 2004.

S. Roy, M. Conti, S. Setia and S. Jajodia, “Secure Data Aggregation

in Wireless Sensor Networks: Filtering out the Attacker’s Impact,”

IEEE Transactions on Information Forensics and Security, Vol. 9,

No. 4, pp. 681–694, , 2014.

B. Przydatek, D. Song, and A. Perrig, “Secure information

aggregation in sensor networks,” Proceedings of ACM SenSys, ACM,

Los Angeles, CA, USA, pp. 255–265, 2003.

R. Dian-xu, Z. Xiao-Guang and Li Li-jun, “Safety Data Fusion

Algorithm in Wireless Sensor Network, Journal of Networks, Vol. 8,

No. 5, pp. 1121–1129, 2013.

J. Grossschadl, “The Chinese Remainder Theorem and its

application in a high-speed RSA crypto chip,” Computer Security

Applications, ACSAC, 16th Annual Conference. pp. 384–393, 2000.

Y. Mo and S. Li, “Base Extent Optimization for RNS Montgomery

Algorithm,” IEEE Trustcom/BigDataSE/ICESS, PP. 1004–1009,

N. Shi, Z. Hou, M. Tan, K. Shao and X. Zhu, “A threshold encryption

scheme without a dealer based on Chinese remainder theorem,”

IEEE 9th International Conference on Communication Software and

Network ICCSN), PP. 90–96, 2017.

W. Stalling (2010), “Cryptography and Network Security : Principles

and Practices(3rd. ed.)”, Prentice-Hall, NJ, USA, 2019.

V. Kumar and N. Srivastava, “Chinese Remainder Theorem based

Full Homomorphic Encryption over Integers,” International Journal

of Applied Engineering Research (ISSN0973-4562), Vol. 14, No. 2,

(Special Issue), pp. 203-208.

Y.H. Ku and X. Sun, “The Chinese remainder theorem,” Journal

Franklin Institute, Vol. 329, pp. 93–97, 1992.

D. E. Knuth, Semi-numerical Algorithms (3rd ed.), The Art of

Computer Programming,” Vol.2. Addison-Wesley, Reading, MA,

X. Zheng, C.T. Huang and M. Matthews, “Chinese remainder

theorem based group key management,” Proceedings of the 45th

annual southeast regional conference. ACM–SE45, New York, NY,

pp. 266–271, 2007.

Downloads

Published

2024-04-19

Issue

Section

Wireless and Mobile Communications