Ensuring reliability and freshness for Data Aggregation inWireless Sensor Networks

The emergence of senor node architecture with its advance capabilities to control the different hardware units and its enhancements in low power and affordable computational devices has made sensor networks from dream to reality. Sensor networks are deployed in widespread targeted areas where they can work for many years and can sense the environment behavior and its different variables without any need to externally charge their installed batteries, the security in sensor networks has become most important aspect along with low power, as the sensors are unattended so there is more possibility of attack in WSN than usual computer networks. Data aggregation security is an important task as if some false node injects a highly odd data values it will highly effect the whole aggregation process. The paper reviews the need of security for data aggregation and propose an architecture which eliminates the false values injection as well as it provides end to end reliability and data freshness, the architecture is also energy optimized.

[1]  Anthony Ephremides,et al.  Information Theory and Communication Networks: An Unconsummated Union , 1998, IEEE Trans. Inf. Theory.

[2]  A. S. Poornima,et al.  SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[3]  Sanjay Kumar Madria,et al.  Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.

[4]  Ning Hu,et al.  Security for fixed sensor networks , 2004, ACM-SE 42.

[5]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[6]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[7]  H. Cam,et al.  SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[8]  Chen Kefei,et al.  A Hash Based Secure Aggregation Protocol for Sensor Network , 2006, 2006 International Conference on Mechatronics and Automation.

[9]  Josep Domingo-Ferrer,et al.  Secure Many-to-One Communications in Wireless Sensor Networks , 2009, Sensors.

[10]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[11]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[12]  Juan Manuel González Nieto,et al.  Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.

[13]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[14]  Suat Ozdemir,et al.  Secure and reliable data aggregation for wireless sensor networks , 2007 .

[15]  Deborah Estrin,et al.  Next Century Challenges: Mobile Networking for Smart Dust , 1999, MobiCom 1999.

[16]  Qi Li,et al.  A security framework for wireless sensor networks , 2010 .

[17]  Patel Swapnil Secure Data Aggregation in Wireless Sensor Networks : A Survey , 2013 .

[18]  Daniel-Ioan Curiac,et al.  Hierarchical data aggregation framework for autonomous decision making in intelligent cities based on wireless sensor networks , 2009 .

[19]  Kyung-suk Lhee,et al.  Securing data aggregation against false data injection in wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[20]  Rabindra Bista,et al.  A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[21]  Sanjay Jha,et al.  Confidential and Secure Broadcast in Wireless Sensor Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  Deborah Estrin,et al.  A wireless sensor network For structural monitoring , 2004, SenSys '04.

[23]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[24]  Heejo Lee,et al.  An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge , 2008, Sensors.

[25]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[26]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.