DARE: evaluating Data Accuracy using node REputation

Abstract Typical wireless sensor networks (WSNs) applications are characterized by a certain number of different requirements such as: data accuracy, localization, reputation, security, and confidentiality. Moreover, being often battery powered, WSNs face the challenge of ensuring privacy and security despite power consumption limitations. When the application scenario allows their use, data aggregation techniques can significantly reduce the amount of data exchanged over the wireless link at the price of an increased computational complexity and the potential exposition to data integrity risks in the presence of malicious nodes. In this paper, we propose DARE, an hybrid architecture combining WSNs with the wireless mesh networking paradigm in order to provide secure data aggregation and node reputation in WSNs. Finally, the use of a secure verifiable multilateration technique allows the network to retain the trustworthiness of aggregated data even in the presence of malicious node. Extensive performance evaluations carried out using simulations as well as a real-world prototype implementation, show that DARE can effectively reduce the amount of data exchanged over the wireless medium delivering up to 50% battery lifetime improvement to the wireless sensors.

[1]  Vikram Srinivasan,et al.  Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .

[2]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  Sabrina Sicari,et al.  SeDAP: Secure Data Aggregation Protocol in Privacy Aware Wireless Sensor Networks , 2010, S-CUBE.

[4]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[5]  Yacine Challal,et al.  SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks , 2007 .

[6]  Fabrizio Granelli,et al.  Energino: A hardware and software solution for energy consumption monitoring , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[7]  Gennaro Boggia,et al.  DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..

[8]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[9]  Mattia Monga,et al.  Assessing data quality by a cross-layer approach , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[10]  Roberto Riggio,et al.  Performance Evaluation of an Hybrid Mesh and Sensor Network , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[11]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[13]  Mattia Monga,et al.  Localization security in Wireless Sensor Networks as a non-cooperative game , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.

[14]  Mattia Monga,et al.  On the impact of localization data in wireless sensor networks with malicious nodes , 2009, SPRINGL '09.

[15]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[16]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[17]  Claudio Soriente,et al.  Collaborative authentication in unattended WSNs , 2009, WiSec '09.

[18]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[19]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[20]  Sabrina Sicari,et al.  Improving data quality using a cross layer protocol in wireless sensor networks , 2012, Comput. Networks.

[21]  Sabrina Sicari,et al.  Cross Layer Data Assessment in Wireless Sensor Networks , 2012, SENSORNETS.

[22]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[23]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[24]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[25]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[26]  Yuguang Fang,et al.  Hardware and software solutions for wireless mesh network testbeds , 2008, IEEE Communications Magazine.

[27]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.