2 research outputs found

    Novel Order preserving encryption Scheme for Wireless Sensor Networks

    Get PDF
    International audienceAn Order-Preserving Encryption (OPE) scheme is a deterministic cipher scheme, whose encryption algorithm produces cipher texts that preserve the numerical ordering of the plain-texts. It is based on strictly increasing functions. It is a kind of homomorphic encryption where the homomorphic operation is order comparison. This means that comparing encrypted data provides the exact result than comparing the original data. It is attractive to be used in databases, especially in cloud ones as a method to enhance security, since it allows applications to perform order queries over encrypted data efficiently (without the need of decrypting the data). Wireless sensor network is another potential domain in which order preserving encryption can be adopted and used with high impact. It can be integrated with secure data aggregation protocols that use comparison operations to aggregate data (MAX, MIN, etc.) in a way that no decryption is being performed on the sensor nodes, which means directly less power consumption. In this paper, we will review many existing order-preserving encryption schemes with their related brief explanation, efficiency level, and security. Then, and based on the comparative table generated, we will propose a novel order-preserving encryption scheme that has a good efficiency level and less complexity, in order to be used in a wireless sensor network with an enhanced level of security

    Two Security Layers for Hierarchical Data Aggregation in Sensor Networks

    No full text
    International audienceDue to resource restricted sensor nodes, it is important to minimise the amount of data transmission among sensor networks. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, as sensor networks are often deployed in untrusted and even hostile environments, sensor nodes are prone to node compromise attacks. Hence, an end-to-end secure aggregation approach is required to ensure a healthy data reception. In this paper, we propose two layers for secure data aggregation in sensor networks. Firstly, we provide an end-to-end encryption scheme that supports operations over cypher-text. It is based on elliptic curve cryptography that exploits a smaller key size, allows the use of higher number of operations on cypher-texts and prevents the distinction between two identical texts from their cryptograms. Secondly, we propose a new watermarking-based authentication that enables sensor nodes to ensure the identity of other nodes they are communicating with. Our experiments show that our hybrid approach of secure data aggregation enhances the security, significantly reduces computation and communication overhead, and can be practically implemented in on-the-shelf sensor platforms
    corecore