Secure data aggregation in wireless sensor networks: A comprehensive overview

Wireless sensor networks often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to resource restricted sensor nodes, it is important to minimize the amount of data transmission so that the average sensor lifetime and the overall bandwidth utilization are improved. Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network. As wireless sensor networks are usually deployed in remote and hostile environments to transmit sensitive information, sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and integrity are extremely important. Hence, wireless sensor network protocols, e.g., data aggregation protocol, must be designed with security in mind. This paper investigates the relationship between security and data aggregation process in wireless sensor networks. A taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area. In addition, based on the existing research, the open research areas and future research directions in secure data aggregation concept are provided.

[1]  Deborah Estrin,et al.  Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Baltasar Beferull-Lozano,et al.  On network correlated data gathering , 2004, IEEE INFOCOM 2004.

[4]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[5]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[6]  Yang Xiao,et al.  Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[7]  H. Cam,et al.  SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[8]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Deborah Estrin,et al.  The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[10]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[11]  Paul J.M. Havinga,et al.  A Dynamic Data Aggregation Scheme for Wireless Sensor Networks , 2003 .

[12]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.

[13]  Kablosuz Algilayici,et al.  SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS VIA HOMOMORPHIC ENCRYPTION , 2008 .

[14]  Josep Domingo-Ferrer,et al.  A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.

[15]  Yang Xiao,et al.  Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[16]  Hasan Cam,et al.  Minimizing False Alarms on Intrusion Detection for Wireless Sensor Networks in Realistic Environments , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[17]  Hasan C¸am and Suat Ozdemir False Data Detection and Secure Data Aggregation in Wireless Sensor Networks , 2007 .

[18]  Ioana Rodhe,et al.  n-LDA: n-Layers Data Aggregation in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[19]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[20]  Ramesh Govindan,et al.  The impact of spatial correlation on routing with compression in wireless sensor networks , 2008, TOSN.

[21]  Xiuzhen Cheng,et al.  Aggregation tree construction in sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[22]  Suat Özdemir,et al.  Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.

[23]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[24]  V.W.S. Wong,et al.  An energy-aware spanning tree algorithm for data aggregation in wireless sensor networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[25]  Suat Ozdemir,et al.  Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism , 2007, IEEE International Conference on Pervasive Services.

[26]  Bu-Sung Lee,et al.  A hierarchical scheme for data aggregation in sensor network , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[27]  Tatsuaki Okamoto,et al.  A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.

[28]  Hasan Çam,et al.  Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..

[29]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[30]  Krishna M. Sivalingam,et al.  Data Gathering Algorithms in Sensor Networks Using Energy Metrics , 2002, IEEE Trans. Parallel Distributed Syst..

[31]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[32]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[33]  Hasan Cam,et al.  False Data Detection and Secure Data Aggregation in Wireless Sensor Networks , 2007 .

[34]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[35]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[36]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[37]  Jörg Widmer,et al.  In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.

[38]  Sajal K. Das,et al.  Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .

[39]  Pramod K. Varshney,et al.  Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.

[40]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[41]  Suat Özdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008, Comput. Commun..

[42]  T. Mexia,et al.  Author ' s personal copy , 2009 .

[43]  Francesca Cuomo,et al.  A MAC protocol for Delay-Bounded applications in Wireless Sensor Networks , 2004 .

[44]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[45]  Catherine Rosenberg,et al.  Design guidelines for wireless sensor networks: communication, clustering and aggregation , 2004, Ad Hoc Networks.

[46]  Murat Demirbas,et al.  The impact of data aggregation on the performance of wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[47]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[48]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[49]  Yang Xiao,et al.  Security in distributed, grid, mobile, and pervasive computing , 2007 .

[50]  F.H.P. Fitzek,et al.  MAC-layer approach for cluster-based aggregation in sensor networks , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[51]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.