trees to utilise redundant aggregation paths to com-
pare the outcome of the aggregation and uses hash
trees to be able to determine attackers.
Due to its efficient cryptographic operations, Ac-
countant’s additional messaging overhead is com-
pensated by the lower computational power required
to perform. Accountant does only need to initiate the
second phase of identification, if an attack has been
recognised, lowering its output of messages and re-
quired work in the normal case.
Future work will investigate the reduction of the
number of required trees, so that the overall network
footprint can be reduced.
REFERENCES
Bertoni, G., Daemen, J., Peeters, M., and Assche, G. V.
(2009). The road from panama to keccak via radiog-
atún. In Handschuh, H., Lucks, S., Preneel, B., and
Rogaway, P., editors, Symmetric Cryptography, 11.01.
- 16.01.2009, volume 09031 of Dagstuhl Seminar
Proceedings. Schloss Dagstuhl - Leibniz-Zentrum für
Informatik, Germany.
Boneh, D., Gentry, C., Lynn, B., and Shacham, H. (2003).
Aggregate and verifiably encrypted signatures from
bilinear maps. In Biham, E., editor, Advances in
Cryptology — EUROCRYPT 2003, pages 416–432,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Bornholdt, H., Jost, D., Kisters, P., Rottleuthner, M., Bade,
D., Lamersdorf, W., Schmidt, T. C., and Fischer, M.
(2019). SANE: Smart networks for urban citizen
participation. In Proceedings of the IEEE 26th In-
ternational Conference on Telecommunications (ICT
2019).
Brinkmeier, M., Schäfer, G., and Strufe, T. (2009). Optim-
ally dos resistant p2p topologies for live multimedia
streaming. IEEE Transactions on Parallel and Dis-
tributed Systems, 20(6):831–844.
Chen, C.-M., Lin, Y.-H., Lin, Y.-C., and Sun, H.-M.
(2012). RCDA: Recoverable concealed data aggreg-
ation for data integrity in wireless sensor networks.
IEEE Transactions on Parallel and Distributed Sys-
tems, 23(4):727–734.
Fasolo, E., Rossi, M., Widmer, J., and Zorzi, M. (2007).
In-network aggregation techniques for wireless sensor
networks: a survey. IEEE Wireless Communications,
14(2):70–87.
Fog, A. (2019). 4. instruction tables. ht-
tps://www.agner.org/optimize/instruction_tables.pdf.
Accessed on 2019-12-17.
Gamal, T. E. (1985). A public key cryptosystem and a sig-
nature scheme based on discrete logarithms. IEEE
Trans. Information Theory, 31(4):469–472.
Granlund, T. (2019). Instruction latencies and through-
put for amd and intel x86 processors. ht-
tps://gmplib.org/ tege/x86-timing.pdf. Accessed on
2019-12-17.
He, W., Nguyen, H., Liu, X., Nahrstedt, K., and Abdelza-
her, T. (2008). iPDA: An integrity-protecting private
data aggregation scheme for wireless sensor networks.
In Proceedings - IEEE Military Communications Con-
ference MILCOM.
Kumar, V. and Madria, S. (2013). PIP: Privacy and integ-
rity preserving data aggregation in wireless sensor net-
works. 2013 IEEE 32nd International Symposium on
Reliable Distributed Systems, pages 10–19.
Lamport, L. (2006). Lower bounds for asynchronous con-
sensus. Distributed Computing, 19(2):104–125.
Mahimkar, A. and Rappaport, T. (2004). SecureDAV: a
secure data aggregation and verification protocol for
sensor networks. In IEEE Global Telecommunica-
tions Conference, 2004. GLOBECOM ’04., volume 4,
pages 2175–2179. IEEE.
Merkle, R. C. (1990). A certified digital signature. In Lec-
ture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), volume 435 LNCS, pages
218–238.
Mohamed, N., Al-Jaroodi, J., Jawhar, I., Lazarova-Molnar,
S., and Mahmoud, S. (2017). Smartcityware: a
service-oriented middleware for cloud and fog en-
abled smart city services. Ieee Access, pages 17576–
17588.
Parakh, A. and Kak, S. C. (2010). Recursive secret sharing
for distributed storage and information hiding. CoRR,
abs/1001.3331.
Villanueva, F. J., Santofimia, M. J., Villa, D., Barba, J., and
Lopez, J. C. (2013). Civitas: The smart city middle-
ware, from sensors to big data. In IMIS, 2013 Seventh
int. conf. on, pages 445–450. IEEE.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
568