rcda: recoverable concealed data aggregation for data integrity in wireless sensor networks
DESCRIPTION
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. Chien -Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.4, April 2012 Presenter: 林顥桐 Date: 2012/11/19. Outline. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/1.jpg)
1
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless
Sensor Networks
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun
IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.4, April 2012
Presenter: 林顥桐Date: 2012/11/19
![Page 2: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/2.jpg)
2
Outline
• Introduction• Encryption Scheme and Signature Scheme• RCDA Scheme for Homogeneous WSN• RCDA Scheme for Heterogeneous WSN• Implementation and Comparisons• Conclusion
![Page 3: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/3.jpg)
3
Introduction
• The usage of aggregation functions is constrained
• The base station cannot verify the integrity and authenticity of each sensing data
![Page 4: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/4.jpg)
4
Introduction
• RCDA– The base station can verify the integrity and
authenticity of all sensing data– The base station can perform any aggregation
functions on them
![Page 5: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/5.jpg)
5
Encryption Scheme and Signature Scheme
• Encryption Scheme– Mykleton et al.’s Encryption Scheme
• Signature Scheme– Boneh et al.’s Signature Scheme
![Page 6: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/6.jpg)
6
Encryption Scheme and Signature Scheme
• Mykleton et al.’s Encryption Scheme– Proposed a concealed data aggregation scheme
based on the elliptic curve ELGamal(EC-EG) cryptosystem
![Page 7: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/7.jpg)
7
Encryption Scheme and Signature Scheme
• Boneh et al.’s Signature Scheme– Proposed an aggregate signature scheme which
merges a set of distinct signatures into one aggregated signature
– Based on bilinear map
![Page 8: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/8.jpg)
8
Outline
• Introduction• Encryption Scheme and Signature Scheme• RCDA Scheme for Homogeneous WSN• RCDA Scheme for Heterogeneous WSN• Implementation and Comparisons• Conclusion
![Page 9: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/9.jpg)
9
RCDA Scheme for Homogeneous WSN
![Page 10: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/10.jpg)
10
RCDA Scheme for Homogeneous WSN
• Four procedures– Setup
• Base Station(BS) generates the key pairs– Encrypt-Sign
• Trigger while a sensor decides to send its sensing data to the cluster head(CH)
– Aggregate• Launched after the CH has gathered all ciphertext-signature pairs
– Verify• Receive the sum of ciphertext and signature from CH, BS can
recover and verify each sensing data
![Page 11: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/11.jpg)
11
RCDA Scheme for Homogeneous WSN
• Setup– (PSNi , RSNi ): For each sensor SNi, the BS
generates (PSNi,RSNi) by KeyGen procedure(Boneh scheme) where PSNi = vi and RSNi = xi
– (PBS, RBS): These keys are generated by KeyGen procedure(Mykletun scheme) where PBS ={Y, E, p, G, n} and RBS = t
Privacy key , randomly selected from Zp
Public key, where vi = xi*g
Y = t*G, E is an elliptic curve over a finite Fp, p is a prime number, G is a generator on E, n is the order of E, t is a privacy key randomly from Fp
![Page 12: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/12.jpg)
12
RCDA Scheme for Homogeneous WSN
• Setup– RSNi, PBS, H, are loaded to SNi for all i– BS keeps all public keys PSNi and its own RBS in
privacy
![Page 13: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/13.jpg)
13
RCDA Scheme for Homogeneous WSN
• Encrypt-Sign
Boneh’s signature
Mykleton’s Encrypt
![Page 14: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/14.jpg)
14
RCDA Scheme for Homogeneous WSN
• Aggregate
![Page 15: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/15.jpg)
15
RCDA Scheme for Homogeneous WSN
• Verify– 1)
– 2)
– 3)
– 4) ?
![Page 16: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/16.jpg)
16
Outline
• Introduction• Encryption Scheme and Signature Scheme• RCDA Scheme for Homogeneous WSN• RCDA Scheme for Heterogeneous WSN• Implementation and Comparisons• Conclusion
![Page 17: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/17.jpg)
17
RCDA Scheme for Heterogeneous WSN
![Page 18: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/18.jpg)
18
RCDA Scheme for Heterogeneous WSN
• Five procedures– Setup
• Necessary secrets are loaded to each H-Sensor and L-Sensor– Intracluster Encrypt
• Involve when L-Sensor desire to send their sensing data to the corresponding H-Sensor
– Intercluster Encrypt• Each H-Sensor aggregates the received data and then encrypts and signs the
aggregated result– Aggregate
• If an H-Sensor receives ciphertexts and signatures from other H-Sensor on its routing path, it activates the Aggregate procedure
– Verify• Ensure the authenticity and integrity of each aggregated result
![Page 19: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/19.jpg)
19
RCDA Scheme for Heterogeneous WSN
• Setup– (RHi, PHi ): the BS generates this key pair for each
H-Sensor according to KeyGen(Boneh’s scheme), i.e., RHi = xi and PHi = vi
– (RBS, PBS): This key pair is generated by KeyGen(Mykletun’s scheme), i.e., PBS = {Y, E, p, G, n} and RBS = t
Public key, where vi = xi*gPrivacy key , randomly selected from Zp
Y = t*G, E is an elliptic curve over a finite Fp, p is a prime number, G is a generator on E, n is the order of E, t is a privacy key randomly from Fp
![Page 20: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/20.jpg)
20
RCDA Scheme for Heterogeneous WSN
• Setup– The BS loads PBS to all L-Sensors. Each H-Sensor is
loaded its own key pair (PHi, RHi), PBS, and several necessary aggregation functions
– Each L-Sensor is required to share a pairwise key with its cluster head
![Page 21: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/21.jpg)
21
RCDA Scheme for Heterogeneous WSN
• Intracluster Encrypt– Ensure the establishment of a secure channel
between L-Sensors and their H-Sensor
![Page 22: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/22.jpg)
22
RCDA Scheme for Heterogeneous WSN
• Intercluster Encrypt– After collecting all sensing data from all cluster
members, an H-Sensor performs the prefered aggregation function on these data as its result
![Page 23: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/23.jpg)
23
RCDA Scheme for Heterogeneous WSN
• Intercluster Encrypt
Boneh’s signature
Mykleton’s Encrypt
![Page 24: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/24.jpg)
24
RCDA Scheme for Heterogeneous WSN
• Aggregate– If H3 receives (c1, ) from H1 and (c2, ) from
H2, H3 will execute this procedure to aggregate (c1, ), (c2, ) and its own (c3, ) as follows:
– Finally, H3 sends ( ) to H5.Similarly, H5 can also aggregate (c4, ), (c5, ), and ( ) then get a new aggregated result ( ) to the BS
![Page 25: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/25.jpg)
25
RCDA Scheme for Heterogeneous WSN
• Verify– 1)
– 2)
– 3)
– 4) ?
![Page 26: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/26.jpg)
26
Outline
• Introduction• Encryption Scheme and Signature Scheme• RCDA Scheme for Homogeneous WSN• RCDA Scheme for Heterogeneous WSN• Implementation and Comparisons• Conclusion
![Page 27: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/27.jpg)
27
Implementation and Comparisons
• Implementation
![Page 28: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/28.jpg)
28
Implementation and Comparisons
• Comparisons
– RCDA-HOMO has worst performance evaluation, because RCDA-HOMO provides better security
![Page 29: RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks](https://reader036.vdocuments.pub/reader036/viewer/2022062501/568161ce550346895dd1bc3f/html5/thumbnails/29.jpg)
29
Conclusion
• The base station can securely recover all sensing data rather than aggregated results
• Integrate the aggregate signature scheme to ensure data authenticity and integrity in the design