Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach

被引:56
作者
Zhang, Wei [1 ]
Liu, Yonghe [1 ]
Das, Sajal K. [1 ]
De, Pradip [1 ]
机构
[1] Univ Texas Arlington, Ctr Res Wireless Mobil & Networking CReWMaN, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
Wireless sensor networks; Data aggregation; Authentication; Watermarking;
D O I
10.1016/j.pmcj.2008.05.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In-network processing presents a critical challenge for data authentication in wireless sensor networks (WSNs). Current schemes relying on Message Authentication Code (MAC) cannot provide natural support for this operation since even a slight modification to the data invalidates the MAC. Although some recent works propose using privacy homomorphism to support in-network processing, they can only work for some specific query-based aggregation functions, e.g. SUM, average, etc. In this paper, based on digital watermarking, we propose an end-to-end, statistical approach for data authentication that provides inherent support for in-network processing. In this scheme, authentication information is modulated as watermark and superposed on the sensory data at the sensor nodes. The watermarked data can be aggregated by the intermediate nodes without incurring any en route checking. Upon reception of the sensory data, the data sink is able to authenticate the data by validating the watermark, thereby detecting whether the data has been illegitimately altered. In this way, the aggregation-survivable authentication information is only added at the sources and checked by the data sink, without any involvement of intermediate nodes. Furthermore, the simple operation of watermark embedding and complex operation of watermark detection provide a natural solution of function partitioning between the resource limited sensor nodes and the resource abundant data sink. In addition, the watermark can be embedded in both spatial and temporal domains to provide the flexibility between the detection time and detection granularity. The simulation results show that the proposed scheme can successfully authenticate the sensory data with high confidence. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:658 / 680
页数:23
相关论文
共 33 条
[1]  
[Anonymous], INTRO DIRECT SEQUENC
[2]  
[Anonymous], 2000, COMPUTATIONAL GEOMET
[3]  
[Anonymous], Intel Lab data
[4]  
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[5]  
Barkat M., 2005, Signal Detection and Estimation, V2nd
[6]  
Barni M., 2004, Watermarking Systems Engineering: Enabling Digital Assets security and Other Applications
[7]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[8]  
Chan H, 2006, CCS 06
[9]  
Cox I. J., 2002, DIGITAL WATERMARKING
[10]   A witness-based approach for data fusion assurance in wireless sensor networks [J].
Du, WL ;
Deng, J ;
Han, YS ;
Varshney, PK .
GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, :1435-1439