<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Applicability of Security Measures in a Wireless Sensor Network Use Case</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Martin</forename><surname>Leuckert</surname></persName>
							<email>martin.leuckert@ovgu.de</email>
							<affiliation key="aff0">
								<orgName type="department">Clinic of Nephrology</orgName>
								<orgName type="institution">University of Magdeburg</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Peter</forename><forename type="middle">R</forename><surname>Mertens</surname></persName>
							<email>peter.mertens@med.ovgu.de</email>
							<affiliation key="aff1">
								<orgName type="department">Clinic of Nephrology</orgName>
								<orgName type="institution">University of Magdeburg</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gunter</forename><surname>Saake</surname></persName>
							<email>saake@iti.cs.uni-magdeburg.de</email>
							<affiliation key="aff2">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Magdeburg</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Applicability of Security Measures in a Wireless Sensor Network Use Case</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DCB243949BFA07EE8FFE9908A3FF2DC6</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:33+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Measurement</term>
					<term>Performance</term>
					<term>Design</term>
					<term>Experimentation</term>
					<term>Security</term>
					<term>Human Factors</term>
					<term>Legal Aspects Data Confidentiality</term>
					<term>Homomorphic Encryption</term>
					<term>Wireless Sensor Network</term>
					<term>Body Area Network</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Wireless Sensor Networks (WSN) are used widely and can be found in a growing number of heterogeneous applications. Consequently, the amount of data produced by these systems increases tremendously. Most data produced by sensor networks is confidential and needs corresponding security measurements. There are many different approaches to maintain data confidentiality; homomorphic cryptosystems, for instance, became a popular research topic for WSN and Body Area Network (BAN) even though they were deemed too costly a few years ago. In the present paper, a selection of homomorphic encryption approaches will be compared to each other as well as to other current standard security measurements. The objective is to evaluate the data security, computational effort, memory requirements, key distribution (if necessary), energy consumption, and usabilityfrom sensor to final storage.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>Sensor Data are collected in very heterogeneous environments. Landscape observing systems or military applications of Wireless Sensor Networks (WSN) are by nearly all accounts different from sensor systems in a Smarter Home environment. However, they all produce confidential data. Particularly if the sensors are recording biometric traits or medical data in a Body Area Network (BAN), confidentiality, integrity and privacy need to be addressed. Due to the diversity of the systems, the possibilities for security measurements are not identical. Battery powered sensors of neither WSN nor BAN are deemed able to implement a highly sophisticated asynchronous cryptosystem as, for example, a modern 'IoT-device' in a medical application can. Medical data streams throughput should not be slowed down significantly by heavy encryption processing, but it probably has higher computational power and does not necessarily rely on battery power.</p><p>Until now, there have been few real applications for homomorphic encryption due to the high demand in computational effort, space requirements, and noise <ref type="bibr" target="#b11">[12]</ref>. However, recent advances in the field of homomorphic encryption show that it is becoming a viable solution to achieve end-to-end confidentiality in wireless sensor networks <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b10">11]</ref>. This paper will start a discussion on whether this is still a long way off or an applicable option.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">USE CASE</head><p>Saxony-Anhalt has approximately 14,9% diabetics <ref type="bibr" target="#b0">[1]</ref>. Diabetes amplifies the probability and intensity of developing nerve damage, especially in extremities. Since this is an iterative process, affected people are not aware of the nerve damages and lack bodily responses like pain. As a result, they tend to stress their feet incorrectly, which can cause the common secondary disease called 'diabetic foot syndrome'. A diabetic foot syndrome leads to inflammations (called ulcer) and oftentimes to amputations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Smart Prevent Diabetic Feet</head><p>Armstrong et al. identified temperature increase in the respective foot regions up to five weeks before an inflammation occurs <ref type="bibr" target="#b2">[3]</ref>.</p><p>Based on these findings, the "Smart Prevent Diabetic Feet" study intends to monitor foot temperature. For this purpose, a specially manufactured insole with six temperature sensors distributed over the insole at the positions shown in Figure <ref type="figure" target="#fig_0">1</ref> is used. The insoles are given out to 150 test persons who will be measuring twice a day for two years. The signals sent by the insoles are then transferred to a smart device using the Bluetooth V4.1 interface. The smart device running an Android App will use the data to evaluate whether an ulceration is about to develop. For this evaluation of the data, several threshold-based algorithms are used. For instance, opposing sensor values are compared. To improve the results, abnormal influences like a heater are filtered out by including historic progression as well as performing 'sanity checks' on the data.</p><p>As this is medical data, it is very valuable and can reveal a patient's diseases like diabetes. Therefore, the sensor data produced in this setup needs to be protected. In the state of the art section the de facto standard for this kind of study as well as other security measures will be introduced. While this example only considers foot temperature, it represents an entrance into the topic. Many more health-monitoring applications, e-Health or "Ambient Assisted Living" systems produce or work with a patient's data. However, many of them rely on an intermediate systemoften called 'aggregator' or 'IoTdevice'like a smartphone or a tablet that gives meaning to the collected sensor values.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">STATE OF THE ART</head><p>Previous research discusses both symmetric as well as asymmetric encryption. However, it was rather common to decline asymmetric encryption due to high computational effort and energy consumption <ref type="bibr" target="#b11">[12]</ref>. Especially Clinical studies like Smart Prevent Diabetic Feet are obligated to comply with data security laws. To meet this requirement, this study is performed as a blinded study. Accordingly, all personal data are pseudonymized and transportation of the data is protected from eavesdropping or manin-the-middle attacks by implementing the standard encryption protocol AES-128/256 for both the Bluetooth V4.1 interface and the HTTPS data transfer.</p><p>One could argue that personal data encrypted with AES-256 is secure; however, the implementation of the cryptosystem may have flaws. On the other hand, a major issue is the security on the smart device, which is vulnerable to social engineering. Therefore, to assure that the data is always protected, the data should never be available as plain data. To prevent the access of plain data, the capturing devices are required to encrypt the data, or the mobile device immediately encrypts the incoming data. This paper will propose different setups and usages of encryption approaches. This will include expectations regarding advantages, flaws and feasibility of each setup.</p><p>There is a broad variety of studies looking into node distribution as well as the path and connectivity between nodes, but this is out of the scope of this paper. Instead, the research presented in this paper is based on previous studies on encryption approaches and security investigations. One of the main issues regarding security in wireless sensor networks is the key distribution. Chen and Chao's survey of key distribution schemes in WSN <ref type="bibr" target="#b8">[9]</ref> are a valuable introduction into the topic.</p><p>There is a variety of (lightweight) encryption algorithms that can be used in BAN to protect the confidentiality of the data. Next to the AES, which was mentioned before, there are the 'Tiny Encryption Algorithm' (TEA) as well as lightweight block ciphers like HIGHT, PRESENT, Prince and KLEIN to name a few. Each of them has different advantages and disadvantages and different areas of application <ref type="bibr" target="#b4">[5]</ref>. However, all of them are considered suitable for the use of embedded systems with limited resources, whereas asymmetric approaches, for instance the 1024-bit RSA, are less suitable for a very small sensor device running on battery power.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Problem Formulation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acquisition</head><p>Wireless Sensor Networks and Medical Applications produce tremendous amounts of confidential data. However, many of these applications open up severe security loopholes <ref type="bibr">[13]</ref>. Especially on the sensors' side, data security is sometimes non-existent. Due to their differences in cost efficiency, there are not many security measures that can be applied. Apart from computational limitations, there are RAM constraints as well, which require block ciphers optimization of memory consumption. Energy consumption also remains an issue that concerns most autonomous sensors, because renewable energy is absent.</p><p>The most likely attacks are impersonation or denial-of-service attacks <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4]</ref>. Usually, there are no backups for a sensor in a BAN; the denial-of-service attack may prevent that vital life signals are monitored. The impersonation attack on weak encrypted or even plain signals may disclose personal information. In Wireless Sensor Networks, if a node is compromised, it usually will be excluded from the cluster in case a malicious intent can be detected. BAN do not have these possibilities since they do not have any redundancy. This means either that a compromised node leads to a data breach or even a shutdown of the compromised system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Communication</head><p>For saving resources, communication protocols like Bluetooth Security Level 1 could be used, which do not implement any security measures at all. In the context of highly confidential data, as in the use case described above, this cannot be used. To prevent attacks like 'Man-in-the Middle' or 'Eavesdropping', Bluetooth Security Level 4 ("Authenticated LE Secure Connections pairing with encryption") is used. This level requires a connection that must be encrypted using the Secure Connection Pairing, which was introduced in Bluetooth LE version 4.2. However, this does not address already encrypted communications. If, for instance, a homomorphic encryption approach is applied, the additional effort to encrypt the data again through the Bluetooth protocol produces unnecessary overhead. Going back to Bluetooth Security Level 1 makes sense in that case; however, the authentication issue and impersonation still need to be addressed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Storage</head><p>There are major differences in terms of storing and working with encrypted data and plain data. While the assumption used to be that a server will be compromised at some point, it is not recommendable to trust a cloud system to begin with. The confidentiality and integrity of data is at risk at all times as long as no proper security measurements have been implemented. As each system faces individual threats, a fitting security scheme requires a threat analysis. If the outcome is, for instance, that a certain encryption shall be used, the question arises what this means for the database and the performance. Furthermore, if the data in a database stays always encrypted, how does this affect the query performance, the storage requirements, and the design of the database? The different setups described in the following chapter shed light on the impact on usability, security, and performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">APPROACHES AND IDEAS</head><p>Security investigations usually compare different cryptosystems against each other and look at the code length, block size, and the number of rounds, etcetera. This paper will take the setup as a whole into account in order to identify additional parameters that might influence the data security and performance. On the one hand, different cryptographic algorithms will be used; on the other hand, the setups will encrypt and decrypt at different stages of the process. Because of the differences, each setup is expected to have different security and performance properties. Next to analyzing possible attacks on the systems, the applicability for each involved device will be examined: This starts at the sensor device that records data, continues at the aggregator, and finished at the database. This also includes factors like the utilization of resources (for instance computational effort or memory while computing), key distribution, the required time until data is available, and maintainability.</p><p>One of the setups will not use encryption and instead implement the current data security requirements, which can be fulfilled by pseudonymization of the data. This setup is expected to be the best in terms of computation times, time until availability and energy consumption. However, it is also likely that it poses the greatest risk to the data. Some setups will implement symmetric encryption algorithm AES and lightweight encryption algorithms from section 3.</p><p>For the asymmetric encryption, the additive homomorphic Paillier cryptosystem and an elliptic curve algorithm as well as the fully homomorphic encryption 'THFE' from <ref type="bibr" target="#b6">[7]</ref> are considered. The Paillier is a good example of homomorphic encryption as it can be utilized for Similarity Verification without decrypting the data <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b9">10]</ref>. However, it is expected to be too expensive compared to lightweight symmetric cryptographic algorithms. The paper and the open-source implementation in <ref type="bibr" target="#b6">[7]</ref> raise high expectations and will therefore be compared to the performance, security and advantages and disadvantages of the Paillier cryptosystem as well as the lightweight symmetric cryptosystems.</p><p>Expected outcomes are statements to each investigated approach regarding the resilience against compromises, the resource efficiency, and further advantages and disadvantages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Resilience against compromises</head><p>While the intention is not to guarantee that a node is not compromised, the key distribution (where applicable) must be secure at all times.</p><p>There is a variety of standard cryptanalysis that could be used to examples target different levels and stages of a system. Some attacks target the encryption process and others try to exploit vulnerabilities of the communication. This means that the selection of a 'strong cryptosystem' will not necessarily result in a secure system.</p><p>Even if an attacker would not be able to decrypt ciphertext, just listening to when a communication is established could result in the exposure of habits, like, for instance, when a patient is at home. Vice versa: If an attacker knows when a patient is at home, they could use this information to identify which dataset can be associated with a patient.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Resource efficiency</head><p>Encryption and key management should not have a huge impact in cases of limited resources. Usually, asymmetric approaches are not even considered, because they are deemed too expensive. Furthermore, the communication is rather cost heavy, which means that fewer messages exchanged with as few packages as possible should be aimed at.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Advantages &amp; disadvantages</head><p>Are there side effects brought along by the security measures? What operations can be performed on each stage of the process? What are the side effects: e.g. searching in encrypted space is much slower, takes more space etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Setup description</head><p>This section describes the considered scenarios, their pros and cons, security, and applicability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.1">Scenario 1: solution of use case</head><p>The first setup corresponds to the current solution, which means that only the data transfer is encrypted. The transfer protocols implement state-of-the-art encryption, which significantly hampers eavesdropping. However, each device can potentially be compromised in a way. The sensors may face imposter attacks, the smart device could be compromised by malware and the server hosting the database may have an ill-intending administrator. The data is still pseudonymized, but both the sensors and the IoTdevice can easily be linked to a single person as they always carry it. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.2">Scenario 2: encryption on IoT-device</head><p>The imposter attacks described in scenario 1, see Figure <ref type="figure" target="#fig_2">2</ref>, require exchanging the sensor devices, flashing the device's firmware, or getting very close with an impersonating device due to the low range of the Bluetooth signal. At least for this use case an imposter attack is rather unlikely; therefore, the following two scenarios are considered: The sensor transfers encrypted data to the smart device, the data will be decrypted and immediately be re-encrypted using a homomorphic encryption approach. The unencrypted data will never be stored on the device and is only available in memory for a short durationjust long enough to perform the pre-analysis of the data from Section 2. The device has more computational power and energy available than the sensor device and is expected to be able to perform the required calculations in reasonable time. The data will not be decrypted before the transfer to the database server and therefore stays secure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.3">Scenario 3: immediate encryption</head><p>In scenario 3, see Figure <ref type="figure" target="#fig_4">4</ref>, the sensor device already encrypts the data using a public-key cryptosystem (PK). A major difference between approach 2 and 3 can be found on the server side: In approach 2, the data stays encrypted as is. This prevents most attacks if the data never gets decrypted and the key is not compromised. A disadvantage lies in the usability of the data, as it is not searchable or indexable. This is different in approach 3a / 3b, where the data will be decrypted on arrival. In 3a, the data will immediately be re-encrypted on arrival using a searchable encryption scheme. For comparison, the data will stay unencrypted in approach 3b. In the use case from Section 2 the IoT-device is expected to perform a pre-analysis of the data based on thresholds. This operation can only be performed on the homomorphically encrypted data. Most of the known homomorphic encryption are asymmetric. For use cases that do not require the aggregator to work with the encrypted data, a symmetric approach could be used, but this is out of the scope of this paper.</p><p>As was mentioned before, the device is required to perform a preanalysis of the data and decide whether the user's temperature data is within a certain range or not. This can be done due the homomorphic encryption approach. Some homomorphic cryptosystems can be exploited in order to implement a "Similarity Search" <ref type="bibr" target="#b7">[8]</ref>, which allows the device to decide about the user's health status without decrypting the data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.4">Scenario 4: always encrypted</head><p>A fourth scenario, see Figure <ref type="figure" target="#fig_5">5</ref>, could be a mixture of 2 and 3; the data will be encrypted as soon as possible using a homomorphic public key cryptosystem and never decrypted. This appears to be the strongest solution in terms of resilience against compromises because the data is almost never available as plain data. On the other hand, encrypted data may still be vulnerable to key leakage, brute force attacks, timing attacks, loopholes in the cryptosystem or implementation and many other threats. Additionally, in scenario 4 all analysis of the data must be performed on the encrypted data, which is very time and resource consuming. Then again, the additional computation is performed on the backend system, which has more available resources than the IoT-device. The fourth scenario is different from Scenario 3, see Figure <ref type="figure" target="#fig_4">4</ref>, because the received data is not searchable and not indexed. Therefore, working and analyzing with the data is hardly possible if it stays encrypted, because only limited operations like, for instance, a predefined set of threshold-based operations are possible, whereas other scenarios allow data mining processes to improve the ulcer detection algorithms from Section 2.</p><p>Assuming the corresponding private key is stored at a trusted third party instead of the backend that stores the encrypted data, this approach prevents data leakage at server-side, because even if an attacker could gain access to the data, they cannot decrypt it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">COMPARISON</head><p>This section summarizes the expected results of a security and performance analysis of the different setups. Various parameters can influence the results. For instance, increasing the key length will improve the security of a cipher but has negative side effects like reducing the possible throughput and increasing memory consumption.  <ref type="table" target="#tab_0">1</ref> does not necessarily reflect the properties of each applied cryptosystem, but the investigated system it is used in. For example, the cipher produced by AES256 can be assumed to be resilient against brute force attacks, but there could still be an imposter sending the cipher. The possibility of an imposter attack is a security flaw of the system rather than of the applied cryptosystem.</p><p>It is not possible to just eavesdrop the communication in approach 1 because the messages are encrypted, but, on every other component, the data is available as plain text. For this reason, it is very prone to compromises of many kinds. This is different in all other setups; however, each has its own advantages and disadvantages and no setup is expected to be perfectly secure. Furthermore, as stated in the introduction of this section, there are different requirements to different use cases. For example, a sensor network with very high throughput and near real-time availability requirements must not be delayed by too much because of computational overhead.</p><p>The databases stay unencrypted in approaches 1, 2, and 3b. Medical data protection for clinical studies require the implementation of proper access control and implementing pseudonymization and a locally secured room for the servers. When these requirements are accomplished the data is somewhat secure because it is hard to gain unauthorized access. Assuming an attacker managed to get access to the study database from the use case of Section 2, they cannot immediately tie data sets to a person because the datasets are pseudonymized. This is different if the attacker already has background information about the probands because they could use their knowledge to look for habits or patterns of the patients, e.g. when they usually go to church, to identify their pseudonym and therefore their datasets.</p><p>Nevertheless, it would leak information about the study, or, in different use cases, other meta information. Here again, this is a question for risk assessment and applicable law, which can play different roles for each use case. In Table <ref type="table" target="#tab_0">1</ref>, this is reflected by decreasing the security score compared to encrypted databases, because it is less secure. On the other hand, the usability of plain data or searchable encryption schemes are better: Queries, indexes, transactions and stored procedures are easily processed because information about the data is given or obtainable. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">CONCLUSION</head><p>All proposed setups have different properties and their suitability does not only depend on the computational power of the nodes but also the quantity of collected data, expected real-time availability, data security requirements and many more. There are vital parameters recording applications, which require special safety and security precautions, while, on the other hand, a forest fire detection application, probably is not as demanding.</p><p>The next step will be to implement the proposed setups and vary the parameters. This includes sensor signals and different encryption approaches with varying key length. An expected outcome of the investigation is a collection of statements regarding the requirements of a setup as discussed in section 1, the data security including possible attacks, as well as usability of the data (can it easily be queried, etc.).</p><p>Another important step would be to retrieve more general statements about the applicability of the proposed setups. Where else can they be applied? What if the database is not located in a trusted environment, e.g. in a cloud system?</p><p>7.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Sensor layout of Smart Insole.</figDesc><graphic coords="2,54.00,82.55,243.25,128.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>compromise the system. A few exemplary attacks are 'Brute Force', 'Ciphertext-Only Attack', and 'Man-in-the-Middle Attack'. The authors of [4] categorize the following examples as 'Modern Attacks': An attacker could exploit 'Operating System Flaws' or 'Memory Residues', 'Temporary Files', 'Differential Power Analysis', 'RSA-155 (512-bit) Factorization'. The</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Scenario 1 -standard communication protocols.</figDesc><graphic coords="3,317.90,533.90,244.40,77.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. Scenario 2 -encryption on IoT-device.</figDesc><graphic coords="4,54.00,99.50,247.60,79.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Scenario 3a/bimmediate encryption.</figDesc><graphic coords="4,54.00,429.50,247.30,79.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. Scenario 4 -always encrypted.</figDesc><graphic coords="4,317.90,217.70,247.30,79.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 . Expected performance of the scenarios (--equals very bad / non-existent, ++ equals very good).</head><label>1</label><figDesc></figDesc><table><row><cell></cell><cell>Resilience</cell><cell>Resource</cell><cell></cell></row><row><cell>Scenario</cell><cell>against</cell><cell>efficiency</cell><cell>Utility</cell></row><row><cell></cell><cell>compromises</cell><cell>(collectively)</cell><cell></cell></row><row><cell>1</cell><cell>--</cell><cell>o</cell><cell>++</cell></row><row><cell>2</cell><cell>o</cell><cell>+</cell><cell>+</cell></row><row><cell>3a</cell><cell>+</cell><cell>o</cell><cell>+</cell></row><row><cell>3b</cell><cell>o</cell><cell>+</cell><cell>++</cell></row><row><cell>4</cell><cell>+</cell><cell>-</cell><cell>o</cell></row><row><cell>Table</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc></figDesc><table><row><cell>gives more in-depth information about the resource</cell></row><row><cell>consumption per component. The first scenario only uses standard</cell></row><row><cell>protocol exchanges, which is why it is not affected by the</cell></row><row><cell>selection of cryptographic function. All other scenarios are</cell></row><row><cell>affected by this.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 . Resource consumption per component.</head><label>2</label><figDesc>; on sensor device side the encryption effort is looked at. The limiting resource factors for each component can vary depending on the performed operations, the selected encryption (function and key length) and the available resources per component. Due to this, there can be different limiting factors like, for instance, CPU, RAM or network adapters (esp. Bluetooth). Hardware accelerations are not used.If a similar threshold-based verification like Rane et al. introduced in<ref type="bibr" target="#b7">[8]</ref> is used, the verification takes place on a trusted third party. However, this does reduce the required effort for the aggregator or backend because there are still homomorphic operations prior to the verification itself, which have a similar effort.The tables should be understood as a hypothesis of this work. It changes depending on requirements of use cases, availability of resources, and applied cryptosystems. Furthermore, it can be extended by additional setups and requires analyzing each component (sensor device, IoT-device, backend, and communication channels) individually.</figDesc><table><row><cell>Scenario</cell><cell>Sensor device</cell><cell>Aggregator</cell><cell>Backend</cell></row><row><cell>1</cell><cell>Medium</cell><cell>Low</cell><cell>Low</cell></row><row><cell>2</cell><cell>Medium</cell><cell>High</cell><cell>Medium</cell></row><row><cell>3a</cell><cell>Very high</cell><cell>High</cell><cell>Medium</cell></row><row><cell>3b</cell><cell>Very high</cell><cell>High</cell><cell>Low</cell></row><row><cell>4</cell><cell>Very high</cell><cell>High</cell><cell>Medium</cell></row><row><cell cols="4">The values for the aggregator and backend include encryption,</cell></row><row><cell cols="4">decryption and homomorphic operations for the pre-analysis (each</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="30" xml:id="foot_0">th GI-Workshop on Foundations of Databases (Grundlagen von Datenbanken), 22.05.2018-25.05.2018, Wuppertal, Germany. Copyright is held by the author/owner(s).</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ACKNOWLEDGEMENTS</head><p>This work was funded by the project "Smart Prevent Diabetic Feet" (DRKS00013798) -EFRE (2016 -2018): Forschungsverbund "Autonomie im Alter".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>8.</head></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">12-Month prevalence of known diabetes mellitus in Germany</title>
		<author>
			<persName><forename type="first">C</forename><surname>Heidemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kuhnert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Born</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nave</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Health Monitoring</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Al Ameen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kwak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Medical Systems</title>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Skin temperature monitoring reduces the risk for diabetic foot ulceration in high-risk patients</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Armstrong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Holtz-Neiderer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wendel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jane</forename><surname>Mohler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kimbriel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Heather</forename><forename type="middle">R</forename><surname>Lavery</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lawrence</forename><forename type="middle">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The American journal of medicine</title>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Methods of Attacking and Defending Cryptosystems</title>
		<author>
			<persName><forename type="first">R</forename><surname>O'hanley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Tiller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Security Management Handbook</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>Sixth Edition</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Y</forename><surname>Moon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Ambient Intell. Human Comput</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Efficient and provably secure aggregation of encrypted data in wireless sensor networks</title>
		<author>
			<persName><forename type="first">C</forename><surname>Castelluccia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><surname>C-F</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mykletun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Tsudik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Sen. Netw</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>Article 20</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds</title>
		<author>
			<persName><forename type="first">I</forename><surname>Chillotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Gama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Georgieva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Izabachène</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology -Asiacrypt 2016</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Secure similarity verification between homomorphically encrypted signals</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vetro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">U.S. Patent</title>
		<imprint>
			<biblScope unit="volume">8249250</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">A survey of key distribution in wireless sensor networks</title>
		<author>
			<persName><forename type="first">Chi-Yuan</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chao</forename><surname>Han-Chieh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Enhanced Data Leakage Detection in IoT Network Backup with Cloud Using Paillier Homomorphic Cryptosystem</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dargad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sutar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Asian Journal of Convergence in Technology</title>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Leveled) Fully Homomorphic Encryption without Bootstrapping</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Brakerski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gentry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vaikuntanathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Comput. Theory</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>Article 13</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Can homomorphic encryption be practical?</title>
		<author>
			<persName><forename type="first">K</forename><surname>Lauter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Naehrig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vaikuntanathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd ACM workshop on Cloud computing security workshop</title>
				<meeting>the 3rd ACM workshop on Cloud computing security workshop</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
