• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research of secure and efficient data aggregation technology of a wireless sensor networks

Research Project

Project/Area Number 22700066
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

OMOTE Kazumasa  北陸先端科学技術大学院大学, 情報科学研究科, 准教授 (50417507)

Project Period (FY) 2010 – 2012
Project Status Completed (Fiscal Year 2012)
Budget Amount *help
¥2,340,000 (Direct Cost: ¥1,800,000、Indirect Cost: ¥540,000)
Fiscal Year 2012: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2011: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2010: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Keywordsセンサ / 情報の完全性 / アグリゲーション
Research Abstract

We proposed an efficient and optimally secure sensor network aggregation protocol against multiple corrupted nodes by a random-walk adversary. Our protocol achieved one round-trip communication to satisfy optimal security without the result-checking phase, by conducting aggregation along with the verification, based on the idea of TESLA technique. We also showed that the congestion complexity, communication complexity and computational cost in our protocol were constant, i.e., O(1). Furthermore, we proposed a basic MAC aggregation protocol.

Report

(4 results)
  • 2012 Annual Research Report   Final Research Report ( PDF )
  • 2011 Annual Research Report
  • 2010 Annual Research Report
  • Research Products

    (51 results)

All 2013 2012 2011 2010 Other

All Journal Article (5 results) (of which Peer Reviewed: 5 results) Presentation (43 results) Remarks (3 results)

  • [Journal Article] Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes2011

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      IEICE Trans.

      Volume: vol. E94-D,No.10 Pages: 1955-1965

    • NAID

      10030193373

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      IEICE Trans.

      Volume: vol. E94-A, No.8 Pages: 1682-1695

    • NAID

      10030190459

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: 94-A(8) Pages: 1682-1695

    • NAID

      10030190459

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes2011

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      IEICE Trans., Information and Systems

      Volume: 94-D(10) Pages: 1955-1965

    • NAID

      10030193373

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Practical and Secure Recovery of Disk Encryption Key Using Smart Cards2010

    • Author(s)
      Kazumasa Omote and Kazuhiko Kato
    • Journal Title

      IEICE Trans.

      Volume: vol. E93-D, No.5 Pages: 1080-1086

    • NAID

      10026815531

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Presentation] How to Build Random Key Pre-distribution Schemes with Self-healing for Multiphase WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 27th IEEE International Conference on Advanced Information Networking and Applications
    • Place of Presentation
      スペイン
    • Year and Date
      2013-03-25
    • Related Report
      2012 Final Research Report
  • [Presentation] Nexat を用いた攻撃予測に関する考察2013

    • Author(s)
      森俊貴,面和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security
    • Place of Presentation
      京都
    • Year and Date
      2013-01-24
    • Related Report
      2012 Final Research Report
  • [Presentation] ネットワークコーディングに適したMAC の一考察2013

    • Author(s)
      浅野貴哉, 宮地充子,面和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security
    • Place of Presentation
      京都
    • Year and Date
      2013-01-23
    • Related Report
      2012 Final Research Report
  • [Presentation] How to Build Random Key Pre-distribution Schemes with Self-healing for Multiphase WSNs2013

    • Author(s)
      Kazumasa Omote
    • Organizer
      The 27th IEEE International Conference on Advanced Information Networking and Applications
    • Place of Presentation
      Barcelona, SPAIN
    • Related Report
      2012 Annual Research Report
  • [Presentation] Nexatを用いた攻撃予測に関する考察2013

    • Author(s)
      森 俊貴
    • Organizer
      The 30th Symposium on Cryptography and Information Security
    • Place of Presentation
      京都,日本
    • Related Report
      2012 Annual Research Report
  • [Presentation] Improvement of multi-user searchable encrypted data scheme2012

    • Author(s)
      Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, and Nguyen Dinh Thuc
    • Organizer
      The 7th International Conference for Internet Technology and Secured Transactions
    • Place of Presentation
      英国
    • Year and Date
      2012-12-10
    • Related Report
      2012 Final Research Report
  • [Presentation] Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing2012

    • Author(s)
      Kazumasa Omote, Tran Thao Phuong
    • Organizer
      IPSJ SIG Technical Report
    • Place of Presentation
      札幌
    • Year and Date
      2012-07-20
    • Related Report
      2012 Final Research Report
  • [Presentation] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 8th International Conference on Information Security Practice and Experience
    • Place of Presentation
      中国
    • Year and Date
      2012-04-11
    • Related Report
      2012 Final Research Report
  • [Presentation] An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs2012

    • Author(s)
      Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops)
    • Place of Presentation
      福岡
    • Year and Date
      2012-03-27
    • Related Report
      2012 Final Research Report
  • [Presentation] An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs2012

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote
    • Organizer
      HWISE2012 : The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops)
    • Place of Presentation
      Fukuoka, Japan
    • Year and Date
      2012-03-27
    • Related Report
      2011 Annual Research Report
  • [Presentation] Improvement of multi-user searchable encrypted data scheme2012

    • Author(s)
      Tran Thao Phuong
    • Organizer
      The 7th International Conference for Internet Technology and Secured Transactions
    • Place of Presentation
      London, UK
    • Related Report
      2012 Annual Research Report
  • [Presentation] Group Signatures with Message-Dependent Opening2012

    • Author(s)
      Yusuke Sakai
    • Organizer
      The 5th International Conference on Pairing-Based Cryptography
    • Place of Presentation
      Gologne, Germany
    • Related Report
      2012 Annual Research Report
  • [Presentation] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazumasa Omote
    • Organizer
      The 8th International Conference on Information Security Practice and Experience
    • Place of Presentation
      Hangzhou, China
    • Related Report
      2012 Annual Research Report
  • [Presentation] Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing2012

    • Author(s)
      Tran Thao Phuong
    • Organizer
      IPSJ SIG Technical Report, Vol.2012-CSEC-58 No.21.
    • Place of Presentation
      札幌,日本
    • Related Report
      2012 Annual Research Report
  • [Presentation] A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 14th International Conference on Information Security and Cryptology
    • Place of Presentation
      韓国
    • Year and Date
      2011-11-30
    • Related Report
      2012 Final Research Report
  • [Presentation] Towards Restricting Plaintext Space in Public Key Encryption2011

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote
    • Organizer
      The 6th International Workshop on Security
    • Place of Presentation
      東京
    • Year and Date
      2011-11-10
    • Related Report
      2012 Final Research Report
  • [Presentation] Towards Restricting Plaintext Space in Public Key Encryption2011

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
    • Organizer
      IWSEC2011 : The 6th International Workshop on Security
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2011-11-10
    • Related Report
      2011 Annual Research Report
  • [Presentation] Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 14th Information Security Conference
    • Place of Presentation
      中国
    • Year and Date
      2011-10-27
    • Related Report
      2012 Final Research Report
  • [Presentation] Adaptive Secure-Channel Free Public-Key Encryption with Kesrword Search Implies Timed Release Encryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Organizer
      ISC2011 : The 14th Information Security Conference
    • Place of Presentation
      Xi'an, China
    • Year and Date
      2011-10-27
    • Related Report
      2011 Annual Research Report
  • [Presentation] 汚染攻撃に耐性を持つXOR ネットワーク符号化の比較・評価2011

    • Author(s)
      伊澤和也, 宮地充子, 面和成
    • Organizer
      Computer Security Symposium
    • Place of Presentation
      新潟
    • Year and Date
      2011-10-20
    • Related Report
      2012 Final Research Report
  • [Presentation] 汚染攻撃に耐性を持つXORネットワーク符号化の比較-評価2011

    • Author(s)
      伊澤和也, 宮地充子, 面和成
    • Organizer
      CSS2011 : Computer Security Symposium
    • Place of Presentation
      Niigata, Japan
    • Year and Date
      2011-10-20
    • Related Report
      2011 Annual Research Report
  • [Presentation] POLISH: Proactive co-Operative Link Self-Healing for Wireless Sensor Networks2011

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems
    • Place of Presentation
      フランス
    • Year and Date
      2011-10-11
    • Related Report
      2012 Final Research Report
  • [Presentation] POLISH : Proactive Co-operative Link Self-HeaHng for Wireless Sensor Networks2011

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote
    • Organizer
      SSS2011 : The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems
    • Place of Presentation
      Grenoble, France
    • Year and Date
      2011-10-11
    • Related Report
      2011 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗,面和成,宮地充子
    • Organizer
      IPSJ SIG Tech. Rep.
    • Place of Presentation
      大阪
    • Year and Date
      2011-03-11
    • Related Report
      2012 Final Research Report
  • [Presentation] ワイヤレスセンサネットワークにおけるMicaZ を用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也,面和成,宮地充子
    • Organizer
      IPSJ SIG Tech. Rep.
    • Place of Presentation
      大阪
    • Year and Date
      2011-03-11
    • Related Report
      2012 Final Research Report
  • [Presentation] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Organizer
      IPSJ SIG Tech.Rep, CSEC-52
    • Place of Presentation
      Osaka, Japan
    • Year and Date
      2011-03-11
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおけるMicaZを用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也, 面和成, 宮地充子
    • Organizer
      IPSJ SIG Tech.Rep, CSEC-52
    • Place of Presentation
      Osaka, Japan
    • Year and Date
      2011-03-11
    • Related Report
      2010 Annual Research Report
  • [Presentation] メッセージ依存開示可能グループ署名と匿名掲示板への応用2011

    • Author(s)
      江村恵太, 花岡悟一郎, 川合豊, 松田隆宏, 面和成, 坂井祐介
    • Organizer
      The 2011 Symposium on Cryptography and Information Security
    • Place of Presentation
      小倉
    • Year and Date
      2011-01-27
    • Related Report
      2012 Final Research Report
  • [Presentation] 公開鍵暗号における平文空間の制限の実現に向けて2011

    • Author(s)
      江村恵太, 花岡悟一郎, 川合豊, 面和成, 坂井祐介
    • Organizer
      The 2011 Symposium on Cryptography and Information Security
    • Place of Presentation
      小倉
    • Year and Date
      2011-01-27
    • Related Report
      2012 Final Research Report
  • [Presentation] 匿名ID ベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法2011

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Organizer
      The 2011 Symposium on Cryptography and Information Security
    • Place of Presentation
      小倉
    • Year and Date
      2011-01-27
    • Related Report
      2012 Final Research Report
  • [Presentation] RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010
    • Place of Presentation
      米国
    • Year and Date
      2010-12-07
    • Related Report
      2012 Final Research Report
  • [Presentation] RPoK : A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, Kazumasa Omote
    • Organizer
      GLOBECOM 2010 : The 8th Grobal Communications Conference Exhibition & Industry Forum
    • Place of Presentation
      MIAMI, Florida, USA
    • Year and Date
      2010-12-07
    • Related Report
      2010 Annual Research Report
  • [Presentation] 削除機能付き匿名検証者指定署名とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      広島
    • Year and Date
      2010-11-05
    • Related Report
      2012 Final Research Report
  • [Presentation] 時限式プロキシ再暗号化方式とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      広島
    • Year and Date
      2010-11-05
    • Related Report
      2012 Final Research Report
  • [Presentation] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      Computer Security Symposium
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-19
    • Related Report
      2012 Final Research Report
  • [Presentation] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Organizer
      Computer Security Symposium
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-19
    • Related Report
      2012 Final Research Report
  • [Presentation] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Organizer
      CSS 2010 : Computer Security Symposium
    • Place of Presentation
      Okayama, Japan
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Organizer
      CSS 2010 : Computer Security Symposium
    • Place of Presentation
      Okayama, Japan
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 4th International Conference on Provable Security, ProvSec 2010
    • Place of Presentation
      マレーシア
    • Year and Date
      2010-10-14
    • Related Report
      2012 Final Research Report
  • [Presentation] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science
    • Place of Presentation
      マレーシア
    • Year and Date
      2010-10-14
    • Related Report
      2012 Final Research Report
  • [Presentation] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 7th European Workshop on Public Key Services
    • Place of Presentation
      ギリシャ
    • Year and Date
      2010-09-23
    • Related Report
      2012 Final Research Report
  • [Presentation] Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 11th International Workshop on Information Security Applications, WISA 2010
    • Place of Presentation
      韓国
    • Year and Date
      2010-08-25
    • Related Report
      2012 Final Research Report
  • [Presentation] Efficient and Optimally Secure In-Network Aggregation in Wireless Sens or Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Organizer
      WISA 2010 : The 11th International Workshop on Information Security Applications
    • Place of Presentation
      Jeju Island, Korea
    • Year and Date
      2010-08-25
    • Related Report
      2010 Annual Research Report
  • [Remarks]

    • URL

      http://www.jaist.ac.jp/~omote/

    • Related Report
      2012 Final Research Report
  • [Remarks]

    • URL

      http://grampus.jaist.ac.jp/miyaji-lab/index-jp.html

    • Related Report
      2011 Annual Research Report
  • [Remarks]

    • URL

      http://grampus.jaist.ac.jp/miyaji-lab/index-jp.html

    • Related Report
      2010 Annual Research Report

URL: 

Published: 2010-08-23   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi