Secure Data Aggregation in Wireless Sensor Networks

被引:66
|
作者
Roy, Sankardas [1 ]
Conti, Mauro [2 ,3 ]
Setia, Sanjeev [4 ]
Jajodia, Sushil [3 ]
机构
[1] Howard Univ, Dept Syst & Comp Sci, Washington, DC 20059 USA
[2] Univ Padua, Dept Math, I-35131 Padua, Italy
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[4] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
关键词
Base station; data aggregation; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion;
D O I
10.1109/TIFS.2012.2189568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a large sensor network, in-network data aggregation significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e. g., predicate Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false subaggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. In this paper, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false subaggregate values. In particular, we present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false contribution. Thorough theoretical analysis and extensive simulation study show that our algorithm outperforms other existing approaches. Irrespective of the network size, the per-node communication overhead in our algorithm is O(1).
引用
收藏
页码:1040 / 1052
页数:13
相关论文
共 50 条
  • [21] Secure encrypted-data aggregation for wireless sensor networks
    Huang, Shih-I
    Shieh, Shiuhpyng
    Tygar, J. D.
    WIRELESS NETWORKS, 2010, 16 (04) : 915 - 927
  • [22] Secure Data Aggregation and Intrusion Detection in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2015, : 127 - 131
  • [23] Secure data aggregation in wireless sensor networks: A comprehensive overview
    Ozdemir, Suat
    Xiao, Yang
    COMPUTER NETWORKS, 2009, 53 (12) : 2022 - 2037
  • [24] Secure encrypted-data aggregation for wireless sensor networks
    Shih-I Huang
    Shiuhpyng Shieh
    J. D. Tygar
    Wireless Networks, 2010, 16 : 915 - 927
  • [25] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [26] A LIGHTWEIGHT SECURE DATA AGGREGATION PROTOCOL FOR WIRELESS SENSOR NETWORKS
    Sun, Hung-Min
    Chen, Chiung-Hsun
    Li, Po-Chi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (10A): : 6503 - 6514
  • [27] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52
  • [28] Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks
    Liu, Ying
    Peng, Hui
    Wu, Yuncheng
    Zeng, Juru
    Chen, Hong
    Wang, Ke
    Lai, Weiling
    Li, Cuiping
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2018, PT I, 2018, 10827 : 717 - 733
  • [29] Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 188 - 195
  • [30] A Comparison of Secure Data Aggregation Schemes for Wireless Sensor Networks
    Boppana, Rajendra V.
    Pan, Pengjun
    16TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), PROCEEDINGS, 2009, : 179 - 188