Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks

被引:13
作者
Shah, Kaushal [1 ]
Jinwala, Devesh [2 ]
机构
[1] Pandit Deendayal Energy Univ, Comp Engn, Gandhinagar 382007, India
[2] Sardar Vallabhbhai Natl Inst Technol, Comp Engn, Surat 395007, India
关键词
linear wireless sensor networks; secure data aggregation; privacy; malicious node identification; CONCEALED DATA AGGREGATION; MANAGEMENT SCHEMES; ATTACKS;
D O I
10.1007/s11704-021-9460-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Wireless Sensor Networks (WSNs) used for the monitoring applications like pipelines carrying oil, water, and gas; perimeter surveillance; border monitoring; and subway tunnel monitoring form linear WSNs. Here, the infrastructure being monitored inherently forms linearity (straight line through the placement of sensor nodes). Therefore, such WSNs are called linear WSNs. These applications are security critical because the data being communicated can be used for malicious purposes. The contemporary research of WSNs data security cannot fit in directly to linear WSN as only by capturing few nodes, the adversary can disrupt the entire service of linear WSN. Therefore, we propose a data aggregation scheme that takes care of privacy, confidentiality, and integrity of data. In addition, the scheme is resilient against node capture attack and collusion attacks. There are several schemes detecting the malicious nodes. However, the proposed scheme also provides an identification of malicious nodes with lesser key storage requirements. Moreover, we provide an analysis of communication cost regarding the number of messages being communicated. To the best of our knowledge, the proposed data aggregation scheme is the first lightweight scheme that achieves privacy and verification of data, resistance against node capture and collusion attacks, and malicious node identification in linear WSNs.
引用
收藏
页数:9
相关论文
共 49 条
[1]  
Acharya A, 2008, ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, P1, DOI 10.1109/ADCOM.2008.4760419
[2]  
[Anonymous], 2005, KEY DISTRIBUTION MEC
[3]  
[Anonymous], 2014, IACR CRYPTOL EPRINT
[4]  
[Anonymous], 2003, Proceedings of the 1st international conference on Embedded networked sensor systems, DOI [10.1145/958491.958521, DOI 10.1145/958491.958521]
[5]   CORA: Correlation-based resilient aggregation in sensor networks [J].
Buttyan, Levente ;
Schaffer, Peter ;
Vajda, Istvan .
AD HOC NETWORKS, 2009, 7 (06) :1035-1050
[6]   A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks [J].
Chan, Aldar C-F. ;
Castelluccia, Claude .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
[7]  
Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278
[8]   On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks [J].
de Meulenaer, Giacomo ;
Gosset, Francois ;
Standaert, Francois-Xavier ;
Pereira, Olivier .
2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, :580-585
[9]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[10]  
Frikken KB, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P68