Title :
On the (Im)possibility of aggregate message authentication codes
Author :
Chan, Aldar C F ; Castelluccia, Claude
Author_Institution :
Nat. Univ. of Singapore, Singapore
Abstract :
In data aggregation, multiple source nodes send their data to a sink along a concast tree with aggregation done en route so that the sink can obtain the aggregate (which could be the sum, average, etc.) of all these data. End-to-end privacy and aggregate integrity are the two main goals of secure data aggregation. While the privacy goal has been widely studied, providing end-to-end aggregate integrity in the presence of possibly compromised aggregating nodes remains largely an open problem. Message Authentication Codes (MAC) are commonly used to provide end-to-end data integrity in two party settings. Natural extensions of MAC for the data aggregation scenario are considered. It is shown that a straightforward and intuitive refinement of the MAC security model (for the data aggregation setting) is not achievable. A weaker security notion is proposed; whether this notion is achievable remains unclear.
Keywords :
message authentication; source coding; telecommunication security; tree codes; trees (mathematics); MAC security model; aggregate message authentication codes; concast tree; end-to-end data integrity; end-to-end privacy; multiple source nodes; Aggregates; Communication system security; Cryptography; Data privacy; Data security; Energy consumption; Information security; Message authentication; Protection; Wireless sensor networks;
Conference_Titel :
Information Theory, 2008. ISIT 2008. IEEE International Symposium on
Conference_Location :
Toronto, ON
Print_ISBN :
978-1-4244-2256-2
Electronic_ISBN :
978-1-4244-2257-9
DOI :
10.1109/ISIT.2008.4594983