Efficient data aggregation with in-network integrity control for WSN

被引:22
作者
Bagaa, Miloud [2 ]
Challal, Yacine [1 ]
Ouadjaout, Abdelraouf [2 ]
Lasla, Noureddine [2 ]
Badache, Nadjib [2 ]
机构
[1] Univ Technol Compiegne, Heudiasyc UMR CNRS 6599, F-60205 Compiegne, France
[2] Res Ctr Sci & Tech Informat CERIST, Algiers 16000, Algeria
关键词
Wireless sensor networks; Data aggregation; Integrity control;
D O I
10.1016/j.jpdc.2012.06.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that more than 70% of energy is consumed in data transmission in WSN. Since most of the time, the sensed information is redundant due to geographically collocated sensors, most of this energy can be saved through data aggregation. Furthermore, data aggregation improves bandwidth usage and reduces collisions due to interference. Unfortunately, while aggregation eliminates redundancy, it makes data integrity verification more complicated since the received data is unique. In this paper, we present a new protocol that provides control integrity for aggregation in wireless sensor networks. Our protocol is based on a two-hop verification mechanism of data integrity. Our solution is essentially different from existing solutions in that it does not require referring to the base station for verifying and detecting faulty aggregated readings, thus providing a totally distributed scheme to guarantee data integrity. We carried out numerical analysis and simulations using the TinyOS environment. Results show that the proposed protocol yields significant savings in energy consumption while preserving data integrity, and outperforms comparable solutions with respect to some important performance criteria. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:1157 / 1170
页数:14
相关论文
共 27 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks [J].
Alzaid, Hani ;
Foo, Ernest ;
Nieto, Juan Gonzalez .
PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, :419-424
[3]  
[Anonymous], 2003, WORKSH SEC ASS AD HO
[4]  
[Anonymous], P 1 ACM C EMB NETW S
[5]  
Bechkit W., 2010, P 35 IEEE C LOC COMP, P220
[6]   Enhancing Resilience of Probabilistic Key Pre-distribution Schemes for WSNs through Hash Chaining [J].
Bechkit, Walid ;
Bouabdallah, Abdelmadjid ;
Challal, Yacine .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :642-644
[7]  
BISTA R, 2009, DEP AUT SEC COMP 200, P394, DOI DOI 10.1109/DASC.2009.77
[8]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[9]  
Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278
[10]   A practical study of transitory master key establishment for wireless sensor networks [J].
Deng, J ;
Hartung, C ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :289-299