RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.

Slides:



Advertisements
Similar presentations
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Advertisements

Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks Einar Mykletun, Joao Girao, Dirk Westhoff IEEE ICC 2006, /06.
A Pairing-Based Blind Signature
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Kyung Tae Kim, Hee Yong Youn (Sungkyunkwan University)
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin Date: March 13, 2007.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
ASYMMETRIC CIPHERS.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
An Efficient Identity-based Cryptosystem for
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Igor Bilogrevic, Member, IEEE, Murtuza Jadliwala, Member, IEEE, Vishal Joneja,
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Optimal Base Station Selection for Anycast Routing in Wireless Sensor Networks 指導教授 : 黃培壝 & 黃鈴玲 學生 : 李京釜.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Computationally Secure Hierarchical Self- Healing Group Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Bounded relay hop mobile data gathering in wireless sensor networks
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F. Bao Presenter: Jianying Zhou.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
Sensor Networks: privacy-preserving queries Nguyen Dinh Thuc University of Science, HCMC
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
MCEEC: MULTI-HOP CENTRALIZED ENERGY EFFICIENT CLUSTERING ROUTING PROTOCOL FOR WSNS N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi.
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Network Security Celia Li Computer Science and Engineering York University.
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 1 Secure Data Collection in Constrained Tree-based Smart Grid Environments To be published.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Abstract 1/2 Wireless Sensor Networks (WSNs) having limited power resource report sensed data to the Base Station (BS) that requires high energy usage.
Security of the Internet of Things: perspectives and challenges
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Time-Bound Hierarchical Key Assignment Scheme
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Privacy Preserving Ranked Multi-Keyword
Efficient CRT-Based RSA Cryptosystems
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
How to Use Charm Crypto Lib
Presentation transcript:

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.4, April 2012 Presenter: 林顥桐 Date: 2012/11/19 1

Outline Introduction Encryption Scheme and Signature Scheme RCDA Scheme for Homogeneous WSN RCDA Scheme for Heterogeneous WSN Implementation and Comparisons Conclusion 2

Introduction The usage of aggregation functions is constrained The base station cannot verify the integrity and authenticity of each sensing data 3

Introduction RCDA – The base station can verify the integrity and authenticity of all sensing data – The base station can perform any aggregation functions on them 4

Encryption Scheme and Signature Scheme Encryption Scheme – Mykleton et al.’s Encryption Scheme Signature Scheme – Boneh et al.’s Signature Scheme 5

Encryption Scheme and Signature Scheme Mykleton et al.’s Encryption Scheme – Proposed a concealed data aggregation scheme based on the elliptic curve ELGamal(EC-EG) cryptosystem 6

Encryption Scheme and Signature Scheme Boneh et al.’s Signature Scheme – Proposed an aggregate signature scheme which merges a set of distinct signatures into one aggregated signature – Based on bilinear map 7

Outline Introduction Encryption Scheme and Signature Scheme RCDA Scheme for Homogeneous WSN RCDA Scheme for Heterogeneous WSN Implementation and Comparisons Conclusion 8

RCDA Scheme for Homogeneous WSN 9

Four procedures – Setup Base Station(BS) generates the key pairs – Encrypt-Sign Trigger while a sensor decides to send its sensing data to the cluster head(CH) – Aggregate Launched after the CH has gathered all ciphertext-signature pairs – Verify Receive the sum of ciphertext and signature from CH, BS can recover and verify each sensing data 10

RCDA Scheme for Homogeneous WSN Setup – (PSNi, RSNi ): For each sensor SNi, the BS generates (PSNi,RSNi) by KeyGen procedure(Boneh scheme) where PSNi = vi and RSNi = xi – (PBS, RBS): These keys are generated by KeyGen procedure(Mykletun scheme) where PBS ={Y, E, p, G, n} and RBS = t Privacy key, randomly selected from Zp Public key, where vi = xi*g Y = t*G, E is an elliptic curve over a finite Fp, p is a prime number, G is a generator on E, n is the order of E, t is a privacy key randomly from Fp 11

RCDA Scheme for Homogeneous WSN Setup – RSNi, PBS, H, are loaded to SNi for all i – BS keeps all public keys PSNi and its own RBS in privacy 12

RCDA Scheme for Homogeneous WSN Encrypt-Sign Boneh’s signature Mykleton’s Encrypt 13

RCDA Scheme for Homogeneous WSN Aggregate 14

RCDA Scheme for Homogeneous WSN Verify – 1) – 2) – 3) – 4) ? 15

Outline Introduction Encryption Scheme and Signature Scheme RCDA Scheme for Homogeneous WSN RCDA Scheme for Heterogeneous WSN Implementation and Comparisons Conclusion 16

RCDA Scheme for Heterogeneous WSN 17

RCDA Scheme for Heterogeneous WSN Five procedures – Setup Necessary secrets are loaded to each H-Sensor and L-Sensor – Intracluster Encrypt Involve when L-Sensor desire to send their sensing data to the corresponding H-Sensor – Intercluster Encrypt Each H-Sensor aggregates the received data and then encrypts and signs the aggregated result – Aggregate If an H-Sensor receives ciphertexts and signatures from other H- Sensor on its routing path, it activates the Aggregate procedure – Verify Ensure the authenticity and integrity of each aggregated result 18

RCDA Scheme for Heterogeneous WSN Setup – (RHi, PHi ): the BS generates this key pair for each H-Sensor according to KeyGen(Boneh’s scheme), i.e., RHi = xi and PHi = vi – (RBS, PBS): This key pair is generated by KeyGen(Mykletun’s scheme), i.e., PBS = {Y, E, p, G, n} and RBS = t Public key, where vi = xi*g Privacy key, randomly selected from Zp Y = t*G, E is an elliptic curve over a finite Fp, p is a prime number, G is a generator on E, n is the order of E, t is a privacy key randomly from Fp 19

RCDA Scheme for Heterogeneous WSN Setup – The BS loads PBS to all L-Sensors. Each H-Sensor is loaded its own key pair (PHi, RHi), PBS, and several necessary aggregation functions – Each L-Sensor is required to share a pairwise key with its cluster head 20

RCDA Scheme for Heterogeneous WSN Intracluster Encrypt – Ensure the establishment of a secure channel between L-Sensors and their H-Sensor 21

RCDA Scheme for Heterogeneous WSN Intercluster Encrypt – After collecting all sensing data from all cluster members, an H-Sensor performs the prefered aggregation function on these data as its result 22

RCDA Scheme for Heterogeneous WSN Intercluster Encrypt Boneh’s signature Mykleton’s Encrypt 23

RCDA Scheme for Heterogeneous WSN Aggregate – If H3 receives (c1, ) from H1 and (c2, ) from H2, H3 will execute this procedure to aggregate (c1, ), (c2, ) and its own (c3, ) as follows: – Finally, H3 sends ( ) to H5.Similarly, H5 can also aggregate (c4, ), (c5, ), and ( ) then get a new aggregated result ( ) to the BS 24

RCDA Scheme for Heterogeneous WSN Verify – 1) – 2) – 3) – 4) ? 25

Outline Introduction Encryption Scheme and Signature Scheme RCDA Scheme for Homogeneous WSN RCDA Scheme for Heterogeneous WSN Implementation and Comparisons Conclusion 26

Implementation and Comparisons Implementation 27

Implementation and Comparisons Comparisons – RCDA-HOMO has worst performance evaluation, because RCDA-HOMO provides better security 28

Conclusion The base station can securely recover all sensing data rather than aggregated results Integrate the aggregate signature scheme to ensure data authenticity and integrity in the design 29