A Survey on the Encryption of Convergecast Traffic with In-Network Processing

S. Peter, D. Westhoff, C. Castelluccia
2010 IEEE Transactions on Dependable and Secure Computing  
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages are 1) neither keys nor plaintext is available at aggregating nodes, 2) the overall energy
more » ... ion of the backbone can be reduced, 3) the system is more flexible with respect to changing routes, and finally 4) the overall system security increases. We provide a qualitative comparison of available approaches, point out their strengths, respectively weaknesses, and investigate opportunities for further research.
doi:10.1109/tdsc.2008.23 fatcat:5lak5hk6drhh7airjsbamce4cm