crease, the disclosure probability decreases. It is easy
to understand that the more data slices a node made,
the lower chance for malicious nodes to collect all of
them. For all the m values, disclosure probability are
very low when the malicious nodes are less than 50%.
That indicates our method is quite secure even if half
of the network is of malicious nodes.
We further record the communication costs with
different source nodes Φ and m. The results are il-
lustrated by Figure 3. Communication costs increase
while |Φ| increase. It is intuitive that the more nodes
have data to send, the more communication cost will
be occurred in the network. It is independent of the
number of malicious nodes. Number of data slices
m does have a significant impact on communication
cost, especially when the number of source nodes Φ
is high.
5 CONCLUSIONS
In this paper, we point out the needs of performing
privacy-preserving in-network aggregation in wire-
less sensor networks. Two motivating applications are
given. Some existing works have been done. How-
ever, they are either not secure enough or overheads
of key management is too high. In our work, we reuse
their framework but with a more secure and efficient
key management methods. The security and commu-
nication cost have been thoroughly analyzed. Com-
parisons with the two most similar works have been
made. Experimental results confirmed the correctness
of our work. In the future work, we are going to ex-
tend our work to other aggregation methods, such as
Min/Max. We are also going to study other mutual au-
thentication algorithms with lower computation and
communication overhead.
REFERENCES
Castelluccia, C., Mykletun, E., and Tsudik, G. (2005). Effi-
cient Aggregation of Encrypted Data in Wireless Sen-
sor Networks. In MobiQuitous.
Deshpande, A., Nath, S., Gibbons, P. B., and Seshan,
S. (2003). Cache-and-Query for Wide Area Sensor
Databases. In International Conference on Manage-
ment of Data, pages 503–514.
Eschenauer, L. and Gligor, V. D. (2002). A Key-
Management Scheme for Distributed Sensor Net-
works. In Proceedings of the 9th ACM Conference on
Computer and Communications Security, pages 41–
47. ACM.
Fasolo, E. and Rossi, M. and Widmer, J. and Zorzi, M.
(2007). In-network aggregation techniques for wire-
less sensor networks: a survey. In Wireless Communi-
cations, pages 70—-87.
Feng, T., Wang, C., Zhang, W., and Ruan, L. (2008). Confi-
dentiality Protection for Distributed Sensor Data Ag-
gregation. In International Conference on Computer
Communications, pages 56–60.
Girao, J., Westhoff, D., and Schneider, M. (2005). CDA:
Concealed Data Aggregation for Reverse Multicast
Traffic in Wireless Sensor Networks. In IEEE Interna-
tional Conference on Communications, pages 3044–
3049.
He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher,
T. T. (2007). PDA: Privacy-Preserving Data Aggre-
gation in Wireless Sensor Networks. In IEEE Inter-
national Conference on Computer Communications,
pages 2045–2053.
Hellman, M. E. (2002). An Overview of Public Key Cryp-
tography. In IEEE Communications Magazine, pages
42–49.
Krishnamachari, L. and Estrin, D. and Wicker, S. (2002).
The impact of data aggregation in wireless sensor net-
works. In International Conference on Distributed
Computing Systems Workshops, pages 575—-578.
Madden, S., Franklin, M. J., Hellerstein, J. M., and Hong,
W. (2002). TAG: a Tiny AGgregation service for ad-
hoc sensor networks. In ACM SIGOPS Operating Sys-
tems Review, pages 131–146.
Roy, S., Setia, S., and Jajodia, S. (2006). Attack-Resilient
Hierarchical Data Aggregation in Sensor Networks. In
Proceedings of the fourth ACM workshop on Security
of ad hoc and sensor networks, pages 71–82. ACM.
Shi, J., Zhang, R., Liu, Y., and Zhang, Y. (2010). Prisense:
privacy-preserving data aggregation in people-centric
urban sensing systems. In INFOCOM, pages 1–9.
IEEE.
Solis, I. and Obraczka, K. (2004). The Impact of Tim-
ing in Data Aggregation for Sensor Networks. In
IEEE International Conference on Communications,
volume 6, pages 3640–3645. IEEE.
Tang, X. and Xu, J. (2006). Extending Network Lifetime for
Precision-Constrained Data Aggregation in Wireless
Sensor Networks. In IEEE International Conference
on Computer Communications, volume 6, pages 1–12.
Westhoff, D., Girao, J., and Acharya, M. (2006). Con-
cealed Data Aggregation for Reverse Multicast Traf-
fic in Sensor Networks: Encryption, Key Distribu-
tion, and Routing Adaptation. In IEEE Transactions
on Mobile Computing, pages 1417–1431. IEEE Com-
puter Society.
Yao, Y. and Gehrke, J. (2002). The cougar approach to in-
network query processing in sensor networks. In SIG-
MOD, pages 9—-18.
Zhang, W., Wang, C., and Feng, T. (2008). GP2S: Generic
Privacy-Preservation Solutions for Approximate Ag-
gregation of Sensor Data (concise contribution). In
IEEE International Conference on Pervasive Comput-
ing and Communications, pages 179–184. IEEE.
Zhang, Y. and Fang, Y. (2006). ARSA: An Attack-Resilient
Security Architecture for Multihop Wireless Mesh
Networks. In IEEE Journal on Selected Areas in Com-
munications, pages 1916–1928. IEEE.
SENSORNETS 2012 - International Conference on Sensor Networks
228