Secure and efficient sharing aggregation scheme for data protection in WSNs

Wireless sensor networks (WSNs) are omnipresent in a multitude of applications. One of the important common requirements of these applications is the data security. Indeed, the exchanged data in WSNs are often considered as a preferred target, which can be a subject of several threats, such as eavesdropping, replay, falsification, alteration, etc. Another important common requirement of WSNs applications is data aggregation. Indeed, the limitations of such networks in terms of energy, bandwidth and storage accentuate the need of data aggregation. In this paper, we address these two issues. We propose a new efficient approach for data integrity and credibility protection for WSNs, while ensuring the data aggregation. We consider a cluster-based network architecture, where sensor nodes are equally distributed in clusters. Each sensor node is in charge to deliver one bit of the sensed data and at the same time observe the remaining parts through a parity control based encryption approach. In this manner, the sensed data could be effectively and securely controlled with a low overhead compared to the classical aggregation approaches, where all the nodes transmit individually the sensed data. To validate the proposed protocol we have simulated it using the simulator CupCarbon and in order to evaluate its efficiency in terms of energy, we have developed a prototype with the TelosB platform, where the obtained results show that our method is less energy consuming.

[1]  Manuel Koschuch,et al.  Applicability of multiparty computation schemes for Wireless Sensor Networks , 2010, 2010 International Conference on Data Communication Networking (DCNET).

[2]  Mohamed Hamdi,et al.  An elliptic threshold signature framework for k-security in wireless sensor networks , 2008, 2008 15th IEEE International Conference on Electronics, Circuits and Systems.

[3]  M. Tahar Kechadi,et al.  CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.

[4]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[5]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[6]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[7]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[8]  Jing-Feng Li,et al.  Secure Monitoring Scheme Based on Identity-Based Threshold Signcryption for Wireless Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Shen Yu MMμTESLA: Broadcast Authentication Protocol for Multiple-Base-Station Sensor Networks , 2007 .

[10]  Adam Dunkels,et al.  Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .

[11]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[12]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[13]  Ian F. Akyildiz,et al.  Wireless Sensor Networks: Akyildiz/Wireless Sensor Networks , 2010 .

[14]  Habib M. Ammari,et al.  The Art of Wireless Sensor Networks: Volume 1 Fundamentals , 2013 .

[15]  Habib M. Ammari,et al.  The art of wireless sensor networks , 2014 .

[16]  Khyati Chaudhary,et al.  Survey on group authentication in wireless sensor networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[17]  Marcelo Dias de Amorim,et al.  Looking Around First: Localized Potential-Based Clustering in Spontaneous Networks , 2007, IEEE Communications Letters.

[18]  Kamaljit Singh,et al.  Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks , 2013 .