ENERGY EFFICIENT SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Secure data aggregation in wireless sensor networks has two main objectives which are contrasting in nature. i) Efficiently collecting and aggregating data ii) Aggregating the data securely. Many schemes do not take into account the passive adversary and allow the aggregator to decrypt data which certainly is not secure; on the other hand using public key cryptography for end to end security is not efficient. In this paper we study and analyze the performance of the secure hierarchical data aggregation algorithm which uses an efficient public key cryptosystem (elliptic curve cryptography) to achieve end to end security. Unlike many other secure data aggregation algorithms which require separate phases for secure aggregation and integrity verification, the secure hierarchical data aggregation algorithm does not require an additional phase for verification. This saves energy by avoiding additional transmissions and computation overhead on the sensor nodes. We implemented the algorithm on MICA2 and TelosB motes. We measured the execution time and energy consumption of various cryptographic functions on the motes and analyzed how an end to end scheme increases the network life time in a WSN.

[1]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[2]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[3]  Sanjay Kumar Madria,et al.  Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.

[4]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[5]  Ivan Stojmenovic,et al.  Sensor Networks , 2005 .

[6]  S. Peter,et al.  On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .

[7]  Osman Ugus Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS , 2007 .

[8]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[9]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[10]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[11]  Jens Palsberg,et al.  Avrora: scalable sensor network simulation with precise timing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[12]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[13]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[14]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[15]  Hung-Min Sun,et al.  An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.

[16]  Peter Langendoerfer,et al.  On Concealed Data Aggregation for WSNs , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[17]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.