• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2012 Fiscal Year Final Research Report

Research of secure and efficient data aggregation technology of a wireless sensor networks

Research Project

  • PDF
Project/Area Number 22700066
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

OMOTE Kazumasa  北陸先端科学技術大学院大学, 情報科学研究科, 准教授 (50417507)

Project Period (FY) 2010 – 2012
Keywordsセンサ / 情報の完全性 / アグリゲーション
Research Abstract

We proposed an efficient and optimally secure sensor network aggregation protocol against multiple corrupted nodes by a random-walk adversary. Our protocol achieved one round-trip communication to satisfy optimal security without the result-checking phase, by conducting aggregation along with the verification, based on the idea of TESLA technique. We also showed that the congestion complexity, communication complexity and computational cost in our protocol were constant, i.e., O(1). Furthermore, we proposed a basic MAC aggregation protocol.

  • Research Products

    (30 results)

All 2013 2012 2011 2010 Other

All Journal Article (3 results) (of which Peer Reviewed: 3 results) Presentation (26 results) Remarks (1 results)

  • [Journal Article] Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes2011

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      IEICE Trans.

      Volume: vol. E94-D,No.10 Pages: 1955-1965

    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      IEICE Trans.

      Volume: vol. E94-A, No.8 Pages: 1682-1695

    • Peer Reviewed
  • [Journal Article] Practical and Secure Recovery of Disk Encryption Key Using Smart Cards2010

    • Author(s)
      Kazumasa Omote and Kazuhiko Kato
    • Journal Title

      IEICE Trans.

      Volume: vol. E93-D, No.5 Pages: 1080-1086

    • Peer Reviewed
  • [Presentation] How to Build Random Key Pre-distribution Schemes with Self-healing for Multiphase WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 27th IEEE International Conference on Advanced Information Networking and Applications
    • Place of Presentation
      スペイン
    • Year and Date
      2013-03-25
  • [Presentation] Nexat を用いた攻撃予測に関する考察2013

    • Author(s)
      森俊貴,面和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security
    • Place of Presentation
      京都
    • Year and Date
      2013-01-24
  • [Presentation] ネットワークコーディングに適したMAC の一考察2013

    • Author(s)
      浅野貴哉, 宮地充子,面和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security
    • Place of Presentation
      京都
    • Year and Date
      2013-01-23
  • [Presentation] Improvement of multi-user searchable encrypted data scheme2012

    • Author(s)
      Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, and Nguyen Dinh Thuc
    • Organizer
      The 7th International Conference for Internet Technology and Secured Transactions
    • Place of Presentation
      英国
    • Year and Date
      2012-12-10
  • [Presentation] Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing2012

    • Author(s)
      Kazumasa Omote, Tran Thao Phuong
    • Organizer
      IPSJ SIG Technical Report
    • Place of Presentation
      札幌
    • Year and Date
      2012-07-20
  • [Presentation] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 8th International Conference on Information Security Practice and Experience
    • Place of Presentation
      中国
    • Year and Date
      2012-04-11
  • [Presentation] An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs2012

    • Author(s)
      Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops)
    • Place of Presentation
      福岡
    • Year and Date
      2012-03-27
  • [Presentation] A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 14th International Conference on Information Security and Cryptology
    • Place of Presentation
      韓国
    • Year and Date
      2011-11-30
  • [Presentation] Towards Restricting Plaintext Space in Public Key Encryption2011

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote
    • Organizer
      The 6th International Workshop on Security
    • Place of Presentation
      東京
    • Year and Date
      2011-11-10
  • [Presentation] Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 14th Information Security Conference
    • Place of Presentation
      中国
    • Year and Date
      2011-10-27
  • [Presentation] 汚染攻撃に耐性を持つXOR ネットワーク符号化の比較・評価2011

    • Author(s)
      伊澤和也, 宮地充子, 面和成
    • Organizer
      Computer Security Symposium
    • Place of Presentation
      新潟
    • Year and Date
      2011-10-20
  • [Presentation] POLISH: Proactive co-Operative Link Self-Healing for Wireless Sensor Networks2011

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems
    • Place of Presentation
      フランス
    • Year and Date
      2011-10-11
  • [Presentation] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗,面和成,宮地充子
    • Organizer
      IPSJ SIG Tech. Rep.
    • Place of Presentation
      大阪
    • Year and Date
      2011-03-11
  • [Presentation] ワイヤレスセンサネットワークにおけるMicaZ を用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也,面和成,宮地充子
    • Organizer
      IPSJ SIG Tech. Rep.
    • Place of Presentation
      大阪
    • Year and Date
      2011-03-11
  • [Presentation] メッセージ依存開示可能グループ署名と匿名掲示板への応用2011

    • Author(s)
      江村恵太, 花岡悟一郎, 川合豊, 松田隆宏, 面和成, 坂井祐介
    • Organizer
      The 2011 Symposium on Cryptography and Information Security
    • Place of Presentation
      小倉
    • Year and Date
      2011-01-27
  • [Presentation] 公開鍵暗号における平文空間の制限の実現に向けて2011

    • Author(s)
      江村恵太, 花岡悟一郎, 川合豊, 面和成, 坂井祐介
    • Organizer
      The 2011 Symposium on Cryptography and Information Security
    • Place of Presentation
      小倉
    • Year and Date
      2011-01-27
  • [Presentation] 匿名ID ベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法2011

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Organizer
      The 2011 Symposium on Cryptography and Information Security
    • Place of Presentation
      小倉
    • Year and Date
      2011-01-27
  • [Presentation] RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010
    • Place of Presentation
      米国
    • Year and Date
      2010-12-07
  • [Presentation] 削除機能付き匿名検証者指定署名とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      広島
    • Year and Date
      2010-11-05
  • [Presentation] 時限式プロキシ再暗号化方式とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      広島
    • Year and Date
      2010-11-05
  • [Presentation] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      Computer Security Symposium
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-19
  • [Presentation] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Organizer
      Computer Security Symposium
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-19
  • [Presentation] An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 4th International Conference on Provable Security, ProvSec 2010
    • Place of Presentation
      マレーシア
    • Year and Date
      2010-10-14
  • [Presentation] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science
    • Place of Presentation
      マレーシア
    • Year and Date
      2010-10-14
  • [Presentation] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Organizer
      The 7th European Workshop on Public Key Services
    • Place of Presentation
      ギリシャ
    • Year and Date
      2010-09-23
  • [Presentation] Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 11th International Workshop on Information Security Applications, WISA 2010
    • Place of Presentation
      韓国
    • Year and Date
      2010-08-25
  • [Remarks]

    • URL

      http://www.jaist.ac.jp/~omote/

URL: 

Published: 2014-08-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi