KABLOSUZ ALGILAYICI AĞLARINDA HOMOMORFİK ŞİFRELEME İLE GÜVENLİ VERİ KÜMELEME

Artık veri aktarımını önlemek ve istenilen bilgiyi özetleyebilmek için Kablosuz Algılayıcı Ağlarında (KAA) veri kümeleme vazgeçilmez bir ihtiyaçtır. Genelde saldırılara açık ortamlarda kullanılmaları sebebiyle KAA’lar için bir başka önemli gereklilikte ağ üzerinde taşınan verinin gizliliğinin sağlanmasıdır. Ancak geleneksel veri kümeleme protokollerinde veri kümeleme işlemi sırasında veri gizliliğini sağlamak mümkün değildir. Bu çalışmada literatürdeki veri kümeleme teknikleri incelenip bunların veri gizliliğini sağlayan güvenlik algoritmaları ile olan ilişkileri incelenmiştir. Buna ek olarak homomorfik şifrelemeye dayanan yeni ve orijinal bir güvenli veri kümeleme protokolü sunulmuştur. Geliştirilen protokolde homomorfik şifreleme tekniği kullanılarak şifrelenmiş veriler üzerinden veri kümeleme yapmak mümkündür ve bunun sonucu olarakta kümeleme işlemi sırasında veri gizliliği sağlanabilmektedir.

___

  • Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.,
  • Cayirci, E., “A survey on sensor networks”,
  • IEEE Communications Magazine, 40(8), 102-
  • , 2002.
  • Intanagonwiwat, C., Estrin, D., Govindan, R.,
  • Heidemann, J., Impact of network density on
  • Data Aggregation in wireless sensor networks,
  • nd International Conference on Distributed
  • Computing Systems, 575-578, 2002.
  • Fan, K.W., Liu, S., Sinha, P., Structure-free Data
  • Aggregation in Sensor Networks, IEEE
  • Transactions on Mobile Computing, 6(8), 929-
  • , 2007.
  • Cam, H., Ozdemir, S., Nair, P.,
  • Muthuavinashiappan, D., Sanli, H.O., Energy-
  • Efficient and secure pattern based data
  • aggregation for wireless sensor networks, Special
  • Issue of Computer Communications on Sensor
  • Networks, 446-455, 2006.
  • Lee, S., Chung, T., Data Aggregation for
  • Wireless Sensor Networks Using Self organizing
  • Map, Artificial Intelligence and Simulation, V.
  • , 508-517, 2005.
  • Intanagonwiwat, C., Govindan, R., Estrin, D.,
  • Heidemann, J., Silva, F., Directed Diffusion for
  • Wireless Sensor Networking, IEEE/ACM
  • Transactions on Networking, vol.11, no. 1, 2-
  • , 2003.
  • Lindsey, S., Raghavendra, C.S., PEGASIS:
  • Power Efficient Gathering in Sensor Information
  • Systems, IEEE Aerospace Conference, 1125-
  • , 2002.
  • Madden, S.R., Franklin, M.J., Hellerstein, J.M.,
  • Hong, W., TAG: tiny aggregation service for adhoc
  • sensor networks, The 5th symposium on
  • Operating systems design and implementation,
  • -146, 2002.
  • Heinzelman, W., Chandrakasan, A.,
  • Balakrishnan, H., Energy-Efficient
  • Communication Protocol for Wireless Micro
  • Sensor Networks, The 33rd Hawaii
  • International Conference on System Sciences,
  • -10, 2000.
  • Heinzelman, W., Kulik, J., Balakrishnan, H.,
  • Adaptive Protocols for Information
  • Dissemination in Wireless Sensor Networks, The
  • th ACM/IEEE Mobicom Conference, 1999.
  • Hu, L., Evans, D., Secure aggregation for
  • wireless networks, Workshop on Security and
  • Assurance in Ad hoc Networks, 384-392, 2003.
  • Przydatek, B., Song, D. Perrig, A., SIA : Secure
  • information aggregation in sensor networks,
  • SenSys’03, 255 – 265, 2003.
  • Merkle, R.C., Protocols for public key
  • cryptosystems, IEEE Symposium on Research
  • in Security and Privacy, 122-134,1980.
  • Cam, H., Ozdemir, S., Sanli, H.O., Nair, P.,
  • Secure differential data aggregation for wireless
  • sensor networks, Sensor Network Operations,
  • Editor: Phoha, S., La Porta, T.F., Griffin, C.,
  • Wiley-IEEE Press, 422-442, April 2006.
  • Girao, J., Westhoff, D., Schneider,
  • M., Concealed Data Aggregation for Reverse
  • Multicast Traffic in Sensor Networks:
  • Encryption, Key Distribution, and Routing
  • Adaptation. IEEE Transactions on Mobile
  • Computing, 1417-1431, 2006.
  • Domingo-Ferrer, J., A provably secure additive
  • and multiplicative privacy homomorphism,
  • Information Security Conference, LNCS 2433,
  • -483, 2002.
  • Okamoto, T., Uchiyama, S., A new Public-Key
  • Cryptosystem as Secure as Factoring, Advances
  • in Cryptology - EUROCRYPT’98, 208-318,
  • -
  • Mica2 Motes, Crossbow Technologies Inc.,
  • http://www.xbow.com.
  • Seetharam, D., Rhee, S., An efficient pseudo
  • random number generator for low-power sensor
  • networks, 29th Annual IEEE International
  • Conference on Local Computer Networks,
  • -562, 2004.
  • Law, Y. W., Doumen, J., Hartel, P., Survey and
  • benchmark of block ciphers for wireless sensor
  • networks, ACM Transactions on Sensor
  • Networks, 65-93, 2006.
  • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.,
  • A concrete security treatment of symmetric
  • encryption. IEEE Symposium on Foundations
  • of Computer Science, 394–403, 1997.
  • Liu, D., Ning, P., Establishing pairwise keys in
  • distributed sensor networks, 10th ACM
  • Conference on Computer and
  • Communications Security (CCS), 52-61, 2003.
  • Perrig, A., Szewczyk, R., Tygar, D., Wen, V.,
  • Culler, D., SPINS: Security protocols for sensor
  • networks, Wireless Networks Journal (WINE),
  • -534, 2002.
  • Castelluccia, C., Mykletun, E., Tsudik, G.,
  • "Efficient aggregation of encrypted data in
  • wireless sensor networks," Conference on
  • Mobile and Ubiquitous Systems: Networking
  • and Services, vol., no., pp. 109-117, 2005.
  • QualNet Network Simulator by Scalable
  • Network Technologies., www.scalablenetworks.
  • com/
  • Heinzelman, W. R., Chandrakasan, A. and
  • Balakrishnan, H. “An Application-Specific
  • Protocol Architecture for Wireless Microsensor
  • Networks,” IEEE Transactions on Wireless
  • Communications, vol. 1, no. 4, pp. 660–670,
  • October 2002.