Data Aggregation Security Challenge in Wireless Sensor Networks

Data aggregation in wireless sensor networks (WSN) is a rapidly emerging research area. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However, securing data aggregation in WSN is made even more challenging, by the fact that the sensor nodes and aggregators deployed in hostile environments are exposed to various security threats. In this paper, we survey the current research related to security in data aggregation in wireless sensor networks. We have classified the security schemes studied in two main categories: cryptographic based scheme and trust based scheme. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the flaws in existing schemes.

[1]  Emiliano De Cristofaro,et al.  FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks , 2009, WiSec '09.

[2]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[3]  Marcelo Dias de Amorim,et al.  Securing wireless sensor networks against aggregator compromises , 2008, IEEE Communications Magazine.

[4]  Paul Rabinovich,et al.  Secure Aggregation in Sensor Networks Using Neighborhood Watch , 2007, 2007 IEEE International Conference on Communications.

[5]  Josep Domingo-Ferrer,et al.  A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.

[6]  Richard Han,et al.  FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments , 2006, MobiSys '06.

[7]  Suat Ozdemir,et al.  Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism , 2007, IEEE International Conference on Pervasive Services.

[8]  Sandip Sen,et al.  Robust Trust Mechanisms for Monitoring Aggregator Nodes in Sensor Networks , 2008 .

[9]  Deborah Estrin,et al.  A wireless sensor network For structural monitoring , 2004, SenSys '04.

[10]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[11]  S. Shankar Sastry,et al.  A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.

[12]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[13]  Hans Eberle,et al.  Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .

[14]  Pramod K. Varshney,et al.  Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.

[15]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[16]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[17]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[18]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[19]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[20]  Shivakant Mishra,et al.  Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.

[21]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[22]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[23]  Jörg Widmer,et al.  In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.

[24]  Partha Mukherjee Detecting Malicious Sensor Nodes from Learned data Patterns , 2007 .

[25]  H. Cam,et al.  SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[26]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[27]  H. Cam,et al.  Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[28]  Claude Castelluccia,et al.  Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[29]  B SrivastavaMani,et al.  Reputation-based framework for high integrity sensor networks , 2008 .

[30]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[31]  Wang Jun,et al.  Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[32]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[33]  Suat Özdemir,et al.  Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.

[34]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[35]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[36]  K.J.R. Liu,et al.  Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[37]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[38]  Edoardo S. Biagioni,et al.  The Application of Remote Sensor Technology To Assist the Recovery of Rare and Endangered Species , 2002, Int. J. High Perform. Comput. Appl..

[39]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[40]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[41]  Kay Römer,et al.  Medium access control issues in sensor networks , 2006, CCRV.

[42]  Georgios Kambourakis,et al.  Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[43]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[44]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[45]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[46]  Alessandro Sorniotti,et al.  Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .

[47]  H. Cam,et al.  ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).

[48]  Kristofer S. J. Pister,et al.  MEMS for distributed wireless sensor networks , 2002, 9th International Conference on Electronics, Circuits and Systems.

[49]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .