SAAQ: Secure Aggregation for Approximate Queries in WSNs

Wireless Sensor Networks are vulnerable to communication failures and security attacks. Multipath based aggregation techniques such as synopsis diffusion are proposed to address communication failures. This chapter proposes Secure Aggregation for Approximate Queries in Wireless Sensor Networks (SAAQ) where Message Authentication Codes (MACs) are transmitted along with the synopses that are generated using primitive polynomials. SAAQ ensures data freshness and integrity at a communication cost of O(1). Simulation results show that the SAAQ protocol results in lower energy consumption and communication and computation cost compared to the state-of-art protocols [1, 2].

[1]  K.R. Venugopal,et al.  Routing Protocol for Lifetime Maximization of Wireless Sensor Networks , 2006, 2006 International Conference on Advanced Computing and Communications.

[2]  Srinivasan Seshan,et al.  Synopsis diffusion for robust aggregation in sensor networks , 2008, ACM Trans. Sens. Networks.

[3]  Jeffrey Considine,et al.  Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.

[4]  Joseph M. Hellerstein,et al.  Proof Sketches: Verifiable In-Network Aggregation , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[5]  Sushil Jajodia,et al.  Attack-resilient hierarchical data aggregation in sensor networks , 2006, SASN '06.

[6]  Arbee L. P. Chen,et al.  Efficient and robust sensor data aggregation using linear counting sketches , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[7]  K. Venugopal,et al.  Performance of AODV Routing Protocol using Group and Entity Mobility Models in Wireless Sensor Networks , 2008 .

[8]  K. R. Venugopal,et al.  Wireless Sensor Networks Applications and Routing Protocols: Survey and Research Challenges , 2012, 2012 International Symposium on Cloud and Services Computing.

[9]  Haifeng Yu,et al.  DoS-resilient secure aggregation queries in sensor networks , 2007, PODC '07.

[10]  Philippe Flajolet,et al.  Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..

[11]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Arbee L. P. Chen,et al.  Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting , 2012, IEEE Transactions on Knowledge and Data Engineering.

[13]  Sencun Zhu,et al.  SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks , 2008 .

[14]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .

[15]  Arbee L. P. Chen,et al.  Efficient and Robust Schemes for Sensor Data Aggregation Based on Linear Counting , 2010, IEEE Transactions on Parallel and Distributed Systems.

[16]  Suman Nath,et al.  Secure outsourced aggregation via one-way chains , 2009, SIGMOD Conference.

[17]  L M Patnaik,et al.  A flat routing protocol for sensor networks , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).

[18]  Songwu Lu,et al.  Secure Diffusion for Wireless Sensor Networks , 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems.