Analysis of data aggregation in wireless sensor network

Public Key Cryptography was measured too expensive for WSN but it all changed due to the developments in software and hardware prototypes. This paper present and analyze the secure hierarchical data aggregation algorithm which uses an effective Public key cryptography to attain end to end security. Many data aggregation systems which are followed before uses either hop by hop decryption or uses symmetric key cryptography for end to end security but it is not energy efficient. This secure hierarchical data aggregation algorithm does not necessitate additional phase for data integrity verification and also it eludes additional transmissions and computational overhead on the sensor nodes to reduce the amount of energy used up by the network. This Paper measures the execution time and energy consumption of various cryptographic functions of the secure data aggregation algorithm on TelosB sensor network platform, programmed in nesC language and also analyses the performance of the algorithm in the Contiki Os simulator Cooja.

[1]  Hung-Min Sun,et al.  An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.

[2]  Jacques M. Bahi,et al.  Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[3]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[4]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[5]  S. Peter,et al.  On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .

[6]  Sencun Zhu,et al.  SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks , 2008 .

[7]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[8]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[9]  Peter Langendörfer,et al.  tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[10]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[11]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[12]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[14]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[15]  Sanjay Kumar Madria,et al.  Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.