Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review

Wireless sensor networks (WSN) are made up of energy constraint tiny sensing devices which are distributed geographically to monitor inhabited remote areas by collecting the physical phenomenon like temperature, pressure etc. They play a vital role in military surveillance, environment monitoring etc. Unstructured topology in WSN results in large amount of redundant data being transmitted over the resource constraint devices which leads to energy starvation problem. Since the nodes are prone to tamper, thanks to their environment, ensuring the privacy of sensitive data being aggregated and transmitted is important. Hence data aggregation schemes which minimize the data redundancy with the guarantee of security become the attraction of research. Many secured aggregation schemes have been proposed by researchers. In this survey the various existing solutions are surveyed and an attempt is made to classify them based on the node topology and mechanisms employed for assuring privacy.

[1]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[2]  Xiaomin Zhao,et al.  Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks , 2017, IET Inf. Secur..

[3]  Devesh C. Jinwala,et al.  Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[4]  K. R. Venugopal,et al.  SDAMQ: Secure Data Aggregation for Multiple Queries in Wireless Sensor Networks☆ , 2016 .

[5]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.

[6]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[7]  Hasan Çam,et al.  Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.

[8]  Vishal Krishna Singh,et al.  Privacy Preserving In-network Aggregation in Wireless Sensor Networks , 2016, FNC/MobiSPC.

[9]  Kyung-Ah Shim,et al.  A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[10]  Dapeng Wu,et al.  Scalable privacy-preserving big data aggregation mechanism , 2016 .

[11]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[12]  Josep Domingo-Ferrer,et al.  A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.

[13]  Pascal Paillier,et al.  Trapdooring Discrete Logarithms on Elliptic Curves over Rings , 2000, ASIACRYPT.

[14]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[15]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[16]  Mihir Bellare,et al.  Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation , 2006, CCS '06.

[17]  Lathies Bhasker Genetically derived secure cluster-based data aggregation in wireless sensor networks , 2014, IET Inf. Secur..

[18]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[19]  Jianfeng Ma,et al.  A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.

[20]  Josep Domingo-Ferrer,et al.  Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios , 2012, Inf. Fusion.

[21]  Rabindra Bista,et al.  Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks , 2012, IEICE Trans. Inf. Syst..

[22]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.

[23]  Hung-Min Sun,et al.  CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.

[24]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[25]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[26]  Ivan Stojmenovic,et al.  Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks , 2014, Future Gener. Comput. Syst..

[27]  J. Hoffstein,et al.  An introduction to mathematical cryptography , 2008 .

[28]  Xing Li,et al.  Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks , 2015, Sensors.

[29]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[30]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[31]  Min Yoon,et al.  Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[32]  Yang Xiao,et al.  Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.

[33]  Sidi-Mohammed Senouci,et al.  A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography , 2015, Ad Hoc Networks.

[34]  Guisheng Yin,et al.  RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks , 2017, Sensors.

[35]  Shiming He,et al.  An efficient privacy-preserving compressive data gathering scheme in WSNs , 2015, Inf. Sci..

[36]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[37]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.