3. The analysis in this paper was for the case when
t = 1. However, there appears to be a linear rela-
tionship between the k and N/M. Can this result
be formalized and be proven for t > 1?
ACKNOWLEDGEMENTS
The authors would like to thank the anonymous re-
viewers for their comments and useful suggestions.
Portions of this work were supported by Grant CNS-
0915843 from the National Science Foundation.
REFERENCES
Alzaid, H., Foo, E., and Nieto, J. G. (2008). Secure data
aggregation in wireless sensor network: a survey. In
AISC ’08: Proceedings of the sixth Australasian con-
ference on Information security, pages 93–105, Dar-
linghurst, Australia, Australia. Australian Computer
Society, Inc.
Camtepe, S. A. and Yener, B. (2005). Key distribution
mechanisms for wireless sensor networks: a survey.
Technical report, Rensselaer Polytechnic Institute.
Castelluccia, C., Mykletun, E., and Tsudik, G. (2005). Effi-
cient aggregation of encrypted data in wireless sensor
networks. In MOBIQUITOUS ’05: Proceedings of
the The Second Annual International Conference on
Mobile and Ubiquitous Systems: Networking and Ser-
vices, pages 109–117, Washington, DC, USA. IEEE
Computer Society.
Castelluccia, C. and Soriente, C. (2008). Abba: A balls
and bins approach to secure aggregation in wsns. In
WiOpt’08:Sixth International Symposium on Model-
ing and Optimization in Mobile, Ad Hoc, and Wireless
Networks.
Chan, H., Perrig, A., and Song, D. (2006). Secure hierar-
chical in-network aggregation in sensor networks. In
CCS ’06: Proceedings of the 13th ACM conference on
Computer and communications security, pages 278–
287, New York, NY, USA. ACM.
Frikken, K. B. and Dougherty, IV, J. A. (2008). An effi-
cient integrity-preserving scheme for hierarchical sen-
sor aggregation. In WiSec ’08: Proceedings of the first
ACM conference on Wireless network security, pages
68–76, New York, NY, USA. ACM.
He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher,
T. (2007). Pda: Privacy-preserving data aggregation
in wireless sensor networks. In INFOCOM 2007. 26th
IEEE International Conference on Computer Commu-
nications. IEEE, pages 2045–2053.
Hu, L. and Evans, D. (2003). Secure aggregation for wire-
less networks. In SAINT-W ’03: Proceedings of the
2003 Symposium on Applications and the Internet
Workshops (SAINT’03 Workshops), page 384, Wash-
ington, DC, USA. IEEE Computer Society.
Intanagonwiwat, C., Estrin, D., Govindan, R., and Heide-
mann, J. (2002). Impact of network density on data
aggregation in wireless sensor networks. In ICDCS
’02: Proceedings of the 22 nd International Confer-
ence on Distributed Computing Systems (ICDCS’02),
page 457, Washington, DC, USA. IEEE Computer So-
ciety.
Kamat, P., Zhang, Y., Trappe, W., and Ozturk, C. (2005).
Enhancing source-location privacy in sensor network
routing. In ICDCS ’05: Proceedings of the 25th
IEEE International Conference on Distributed Com-
puting Systems, pages 599–608, Washington, DC,
USA. IEEE Computer Society.
Madden, S., Franklin, M. J., Hellerstein, J. M., and Hong,
W. (2002). Tag: a tiny aggregation service for
ad-hoc sensor networks. SIGOPS Oper. Syst. Rev.,
36(SI):131–146.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler,
D. E. (2002). Spins: security protocols for sensor net-
works. Wireless Networks, 8(5):521–534.
Przydatek, B., Song, D., and Perrig, A. (2003). Sia: secure
information aggregation in sensor networks. In SenSys
’03: Proceedings of the 1st international conference
on Embedded networked sensor systems, pages 255–
265, New York, NY, USA. ACM.
Roberto, D. P., Pietro, M., and Refik, M. (2009). Confiden-
tiality and integrity for data aggregation in wsn using
peer monitoring. In Security and Communication Net-
works, pages 181–194.
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., and Cao, G.
(2008). Towards event source unobservability with
minimum network traffic in sensor networks. In WiSec
’08: Proceedings of the first ACM conference on Wire-
less network security, pages 77–88, New York, NY,
USA. ACM.
Yang, Y., Wang, X., Zhu, S., and Cao, G. (2006). Sdap: a
secure hop-by-hop data aggregation protocol for sen-
sor networks. In MobiHoc ’06: Proceedings of the 7th
ACM international symposium on Mobile ad hoc net-
working and computing, pages 356–367, New York,
NY, USA. ACM.
SECRYPT 2010 - International Conference on Security and Cryptography
240