Title :
E-LEACH: Improving the LEACH protocol for privacy preservation in secure data aggregation in Wireless Sensor Networks
Author :
Patel, Himanshu B. ; Jinwala, Devesh C.
Author_Institution :
Comput. Eng. Dept., S.V. Nat. Inst. of Technol., Surat, India
Abstract :
The Wireless Sensor Networks (WSNs) after their emergence have triggered many active research areas; not because of low-scale hardware design but also due to a wide spectrum of its potential applications being in day-to-day areas of our life. However, because of the ubiquitous and pervasive computing paradigm that the WSNs foster and because of the resource constrained characteristic, security & privacy issues therein assume critical investigation. Amongst many potential aspects of investigation, one has been the design of a secure routing protocol in which a value sensed to be delivered to an appropriate receiver securely and efficiently with least amount of energy consumption. We observe that LEACH (Low Energy Adaptive Clustering Hierarchy) is a popular clustering based protocol used in WSNs. However, the same lacks any security support. Amongst numerous improvements of LEACH suggested to incorporate security & privacy, we observe that none, to the best of our knowledge offers end-to-end privacy using the homomorphic encryption schemes. We propose here an improvement of LEACH viz. E-LEACH (end-to-end secure LEACH) which uses homomorphic encryption to provide secure data aggregation in Wireless Sensor Networks. Due to the algebraic characteristics in homomorphic encryption, data can be algebraically aggregated without decryption and hence require least amount of energy, while ensuring privacy.
Keywords :
cryptographic protocols; data privacy; energy consumption; routing protocols; wireless sensor networks; E-LEACH; WSN; clustering based protocol; end-to-end privacy; end-to-end secure LEACH; energy consumption; homomorphic encryption schemes; low energy adaptive clustering hierarchy; pervasive computing paradigm; receiver securely; resource constrained characteristic; secure data aggregation; secure routing protocol; ubiquitous computing paradigm; wireless sensor networks; Base stations; Encryption; Routing protocols; Steady-state; Wireless sensor networks; Clustering; Homomorphic Encryption; LEACH; Secure Data Aggregation;
Conference_Titel :
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
Conference_Location :
Gwalior
Print_ISBN :
978-1-4799-6499-4
DOI :
10.1109/ICIINFS.2014.7036607