DocumentCode :
265022
Title :
E-LEACH: Improving the LEACH protocol for privacy preservation in secure data aggregation in Wireless Sensor Networks
Author :
Patel, Himanshu B. ; Jinwala, Devesh C.
Author_Institution :
Comput. Eng. Dept., S.V. Nat. Inst. of Technol., Surat, India
fYear :
2014
fDate :
15-17 Dec. 2014
Firstpage :
1
Lastpage :
5
Abstract :
The Wireless Sensor Networks (WSNs) after their emergence have triggered many active research areas; not because of low-scale hardware design but also due to a wide spectrum of its potential applications being in day-to-day areas of our life. However, because of the ubiquitous and pervasive computing paradigm that the WSNs foster and because of the resource constrained characteristic, security & privacy issues therein assume critical investigation. Amongst many potential aspects of investigation, one has been the design of a secure routing protocol in which a value sensed to be delivered to an appropriate receiver securely and efficiently with least amount of energy consumption. We observe that LEACH (Low Energy Adaptive Clustering Hierarchy) is a popular clustering based protocol used in WSNs. However, the same lacks any security support. Amongst numerous improvements of LEACH suggested to incorporate security & privacy, we observe that none, to the best of our knowledge offers end-to-end privacy using the homomorphic encryption schemes. We propose here an improvement of LEACH viz. E-LEACH (end-to-end secure LEACH) which uses homomorphic encryption to provide secure data aggregation in Wireless Sensor Networks. Due to the algebraic characteristics in homomorphic encryption, data can be algebraically aggregated without decryption and hence require least amount of energy, while ensuring privacy.
Keywords :
cryptographic protocols; data privacy; energy consumption; routing protocols; wireless sensor networks; E-LEACH; WSN; clustering based protocol; end-to-end privacy; end-to-end secure LEACH; energy consumption; homomorphic encryption schemes; low energy adaptive clustering hierarchy; pervasive computing paradigm; receiver securely; resource constrained characteristic; secure data aggregation; secure routing protocol; ubiquitous computing paradigm; wireless sensor networks; Base stations; Encryption; Routing protocols; Steady-state; Wireless sensor networks; Clustering; Homomorphic Encryption; LEACH; Secure Data Aggregation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
Conference_Location :
Gwalior
Print_ISBN :
978-1-4799-6499-4
Type :
conf
DOI :
10.1109/ICIINFS.2014.7036607
Filename :
7036607
Link To Document :
بازگشت