期刊名称:International Journal of Electronics and Computer Science Engineering
电子版ISSN:2277-1956
出版年度:2012
卷号:1
期号:4
页码:2417-2423
出版社:Buldanshahr : IJECSE
摘要:Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore, reducing the power consumption is a critical concern for a WSN. Unfortunately, an adversary has the ability to capture cluster heads. It would cause the compromise of the whole cluster; these schemes restrict the data type of aggregation or cause extra transmission overhead. Besides, an adversary can still obtain the sensing data of its cluster members after capturing a cluster head. A well-known approach named Concealed Data end-to-end encryption and in-networking processing in WSN. Since CDA applies privacy homomorphism encryption with additive homomorphism, cluster heads are capable of executing addition operations on encrypted numeric data. There are several data aggregation schemes based on privacy homomorphism encryption have been proposed. These schemes provide better security compared with traditional aggregation However, the base station only retrieves the aggregated result, not individual data, which causes two problems. The usage of aggregation functions is constrained and base station cannot confirm data integrity and authenticity