1 / 13

Efficient aggregation of encrypted data in Wireless Sensor Network

This paper discusses efficient aggregation of encrypted data in wireless sensor networks. It covers multi-level network tree, homomorphic encryption, key generation, and additive homomorphic encryption. Limitations and solutions are explored.

lamos
Download Presentation

Efficient aggregation of encrypted data in Wireless Sensor Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin

  2. Multi-level network tree (3-ary)

  3. Computing statistical data • Computing the Average • Computing the Variance

  4. Homomorphic Encryption M: message space C: ciphertext space M is a group under operation C is a group under operation c1 = Enck1(m1), c2 = Enck2(m2)

  5. problem • One limitation of this proposal is that the identities of the on-responding nodes need to be sent along with the aggregate to the sink • 沒有回應之Node的ID,並排的放在aggregate data之後 Ex: C,ID2,ID5,… Bit數高

  6. Number of bits sent per node for each level in a 3-tree of depth 7

  7. Bit length of the number of no responded nodes • Level 1 • IA(10%) = (10 + 8)/3 + 75 = 81 bit per node • IA(30%) = (10 + 10)/3 + 75 = 82 bit per node Bit length of the number of no responded nodes

  8. Key generation • ID [0, P-1], where P is a large integer • Let i be a randomly generated keystream, where i [0, P-1], sink keep i secret • Compute K = ID – i (mod P) • Let K1 = ID1 – i (mod P) => ID1 = K1 + i (mod P) K2 = ID2 – i (mod P) => ID2 = K2 + i (mod P) For = ID1 + ID2 = (K1+K2) + 2*i (mod P) K1+K2 = (ID1+ID2) – 2*i (mod P)

  9. Additive Homomorphic Encryption Key generation : k

  10. Example sink K = ID – i (mod P) 27, 5 66, 10 c = m + k (mod M) aggregation nodes sensor nodes ID1 ID2 ID3 ID4 No respond i = 40, M = 100, P = 50 In sink : C = 27+66 (mod 100) = 93 ID1 + ID3 = 32 – 15 = 17 => key1 + key3 = 17 – 2*90 (mod 100) = -163 (mod 100) = 37 M = C – (key1+key3) (mod 100) = 93 – 37 (mod100) = 56

More Related