Secure Data Aggregation in Wireless Sensor Networks

被引:66
|
作者
Roy, Sankardas [1 ]
Conti, Mauro [2 ,3 ]
Setia, Sanjeev [4 ]
Jajodia, Sushil [3 ]
机构
[1] Howard Univ, Dept Syst & Comp Sci, Washington, DC 20059 USA
[2] Univ Padua, Dept Math, I-35131 Padua, Italy
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[4] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
关键词
Base station; data aggregation; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion;
D O I
10.1109/TIFS.2012.2189568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a large sensor network, in-network data aggregation significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e. g., predicate Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false subaggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. In this paper, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false subaggregate values. In particular, we present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false contribution. Thorough theoretical analysis and extensive simulation study show that our algorithm outperforms other existing approaches. Irrespective of the network size, the per-node communication overhead in our algorithm is O(1).
引用
收藏
页码:1040 / 1052
页数:13
相关论文
共 50 条
  • [31] Distributed Audit Secure Data Aggregation for Wireless Sensor Networks
    Zhang, Zhengdao
    Zhou, Zhiping
    PROCEEDINGS OF 2013 CHINESE INTELLIGENT AUTOMATION CONFERENCE: INTELLIGENT INFORMATION PROCESSING, 2013, 256 : 431 - 438
  • [32] A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    SENSORS, 2015, 15 (07) : 15127 - 15158
  • [33] Secure Data Aggregation Algorithm Based on Trust in Wireless Sensor Networks
    Guo, Rui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 809 - 813
  • [34] Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks
    Solanki, Paresh
    Raval, Gaurang
    Pradhan, Srikant
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 258 - 266
  • [35] Secure and energy-efficient data aggregation for wireless sensor networks
    Othman, Sofiene Ben
    Trad, Abdelbasset
    Alzaid, Hani
    Youssef, Habib
    International Journal of Mobile Network Design and Innovation, 2013, 5 (01) : 28 - 42
  • [36] Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
    Jariwala, Vivaksha
    Patel, Himanshu
    Patel, Parth
    Jinwala, Devesh C.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2014, 5 (03) : 77 - 99
  • [37] A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks
    Bista, Rabindra
    Jo, Kyoung-Jin
    Chang, Jae-Woo
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 394 - 399
  • [38] Security Analysis of Secure Data Aggregation Protocols in Wireless Sensor Networks
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 471 - 474
  • [39] Secure data aggregation in wireless sensor networks using homomorphic encryption
    Kumar, Manish
    Verma, Shekhar
    Lata, Kusum
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2015, 102 (04) : 690 - 702
  • [40] SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS VIA HOMOMORPHIC ENCRYPTION
    Ozdemir, Suat
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2008, 23 (02): : 365 - 373