Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments

Affiliation auteursAffiliation ok
TitreTwo-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments
Type de publicationConference Paper
Year of Publication2018
AuteursBoudia ORafik Mera, Sedjelmaci H, Senouci SMohammed
Conference Name2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
PublisherIEEE; Sprint; Qualcomm; Cisco; Huawei; Natl Instruments; Nokia; Comput Res Assoc Women; GARMIN; Juniper Networks; NSF
Conference Location345 E 47TH ST, NEW YORK, NY 10017 USA
ISBN Number978-1-5386-3180-5
Mots-clésBelief Game, data aggregation, Homomorphic encryption, IDS, Internal Attacks
Résumé

Many resource-constrained applications make use of data aggregation in order to prolong the network lifetime. However, the resource-constrained devices are usually deployed in unattended environments in which providing security is of paramount importance. This leads to various attacks that can occur during data aggregation process. Internal attacks such as selective forwarding represent the most dangerous ones since they cannot be detected by existing cryptography-based protocols proposed to secure data aggregation. In this work, we propose a two-levels verification, in which data is verified using cryptography and intrusion detection techniques. Indeed, a lightweight homomorphic encryption is combined with a game-theory based technique to efficiently secure data aggregation. Our analysis and results show the applicability of the system for aggregation-based resource-constrained applications, especially those considering sensitive information (e.g. health monitoring, military) where the time-efficient detection is crucial.