Kablosuz algılayıcı ağlarında homomorfik şifreleme ile güvenli veri kümeleme

Artık veri aktarımını önlemek ve istenilen bilgiyi özetleyebilmek için Kablosuz Algılayıcı Ağlarında (KAA) veri kümeleme vazgeçilmez bir ihtiyaçtır. Genelde saldırılara açık ortamlarda kullanılmaları sebebiyle KAA’lar için bir başka önemli gereklilikte ağ üzerinde taşınan verinin gizliliğinin sağlanmasıdır. Ancak geleneksel veri kümeleme protokollerinde veri kümeleme işlemi sırasında veri gizliliğini sağlamak mümkün değildir. Bu çalışmada literatürdeki veri kümeleme teknikleri incelenip bunların veri gizliliğini sağlayan güvenlik algoritmaları ile olan ilişkileri incelenmiştir. Buna ek olarak homomorfik şifrelemeye dayanan yeni ve orijinal bir güvenli veri kümeleme protokolü sunulmuştur. Geliştirilen protokolde homomorfik şifreleme tekniği kullanılarak şifrelenmiş veriler üzerinden veri kümeleme yapmak mümkündür ve bunun sonucu olarak da kümeleme işlemi sırasında veri gizliliği sağlanabilmektedir.

Secure data aggregation in wireless sensor networks via homomorphic encryption

Data aggregation is essential for wireless sensor networks to reduce data redundancy and to summarize relevant and necessary information without requiring all pieces of the data. Data confidentiality is another critical requirement for wireless sensor networks as these networks are usually deployed in hostile environments. In traditional data aggregation techniques, however, it is not possible to provide data confidentiality during data aggregation. In this study, we give an overview of the existing data aggregation techniques and examine how they interact with data confidentiality algorithms. In addition, we present a novel secure data aggregation protocol which is based on privacy homomorphic encryption. Due to privacy homomorphism, the proposed protocol allows data aggregation over encrypted data and therefore provides data confidentiality during data aggregation.

___

  • 1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. Cayirci, E., “A survey on sensor networks”, IEEE Communications Magazine, 40(8), 102- 114, 2002.
  • 2. Intanagonwiwat, C., Estrin, D., Govindan, R. Heidemann, J., Impact of network density on Data Aggregation in wireless sensor networks 22nd International Conference on Distributed Computing Systems, 575-578, 2002.
  • 3. Fan, K.W., Liu, S., Sinha, P., Structure-free Data Aggregation in Sensor Networks, IEEE Transactions on Mobile Computing, 6(8), 929- 942, 2007.
  • 4. Cam, H., Ozdemir, S., Nair, P. Muthuavinashiappan, D., Sanli, H.O., Energy- Efficient and secure pattern based data aggregation for wireless sensor networks, Special Issue of Computer Communications on Sensor Networks, 446-455, 2006.
  • 5. Lee, S., Chung, T., Data Aggregation for Wireless Sensor Networks Using Self organizing Map, Artificial Intelligence and Simulation, V. 3397, 508-517, 2005.
  • 6. Intanagonwiwat, C., Govindan, R., Estrin, D. Heidemann, J., Silva, F., Directed Diffusion for Wireless Sensor Networking, IEEE/ACM Transactions on Networking, vol.11, no. 1, 2- 16, 2003.
  • 7. Lindsey, S., Raghavendra, C.S., PEGASIS: Power Efficient Gathering in Sensor Information Systems, IEEE Aerospace Conference, 1125- 1130, 2002.
  • 8. Madden, S.R., Franklin, M.J., Hellerstein, J.M. Hong, W., TAG: tiny aggregation service for ad- hoc sensor networks, The 5th symposium on Operating systems design and implementation 131-146, 2002.
  • 9. Heinzelman, W., Chandrakasan, A., Balakrishnan, H., Energy-Efficient Communication Protocol for Wireless Micro Sensor Networks, The 33rd Hawaii International Conference on System Sciences, 1-10, 2000.
  • 10. Heinzelman, W., Kulik, J., Balakrishnan, H., Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, The 5th ACM/IEEE Mobicom Conference, 1999.
  • 11. Hu, L., Evans, D., Secure aggregation for wireless networks, Workshop on Security and Assurance in Ad hoc Networks, 384-392, 2003.
  • 12. Przydatek, B., Song, D. Perrig, A., SIA : Secure information aggregation in sensor networks SenSys’03, 255 – 265, 2003.
  • 13. Merkle, R.C., Protocols for public key cryptosystems, IEEE Symposium on Research in Security and Privacy, 122-134,1980. , 14. Cam, H., Ozdemir, S., Sanli, H.O., Nair, P., Secure differential data aggregation for wireless sensor networks, Sensor Network Operations, Editor: Phoha, S., La Porta, T.F., Griffin, C. Wiley-IEEE Press, 422-442, April 2006.
  • 15. Girao, J., Westhoff, D., Schneider, M., Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. IEEE Transactions on Mobile Computing, 1417-1431, 2006.
  • 16. Domingo-Ferrer, J., A provably secure additive and multiplicative privacy homomorphism, Information Security Conference, LNCS 2433, 471-483, 2002.
  • 17. Okamoto, T., Uchiyama, S., A new Public-Key Cryptosystem as Secure as Factoring, Advances in Cryptology - EUROCRYPT’98, 208-318, 1998.
  • 18. Mica2 Motes, Crossbow Technologies Inc., http://www.xbow.com.
  • 19. Seetharam, D., Rhee, S., An efficient pseudo random number generator for low-power sensor networks, 29th Annual IEEE International Conference on Local Computer Networks, 560-562, 2004.
  • 20. Law, Y. W., Doumen, J., Hartel, P., Survey and benchmark of block ciphers for wireless sensor networks, ACM Transactions on Sensor Networks, 65-93, 2006.
  • 21. Bellare, M., Desai, A., Jokipii, E., Rogaway, P., A concrete security treatment of symmetric encryption. IEEE Symposium on Foundations of Computer Science, 394–403, 1997.
  • 22. Liu, D., Ning, P., Establishing pairwise keys in distributed sensor networks, 10th ACM Conference on Computer and Communications Security (CCS), 52-61, 2003.
  • 23. Perrig, A., Szewczyk, R., Tygar, D., Wen, V., Culler, D., SPINS: Security protocols for sensor networks, Wireless Networks Journal (WINE), 521-534, 2002.
  • 24. Castelluccia, C., Mykletun, E., Tsudik, G., "Efficient aggregation of encrypted data in wireless sensor networks," Conference on Mobile and Ubiquitous Systems: Networking and Services, vol., no., pp. 109-117, 2005.
  • 25. QualNet Network Simulator by Scalable Network Technologies., www.scalable- networks.com/
  • 26. Heinzelman, W. R., Chandrakasan, A. and Balakrishnan, H. “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, October 2002.