SADA: Secure approximate data aggregation in wireless sensor networks

Wireless Sensor Networks are susceptible to communication failures and security attacks due to broadcast nature of communication. Multipath based communication techniques were designed to address communication failure. This paper proposes Secure Approximate Data Aggregation (SADA) in which synopsis are generated using primitive polynomial and Message Authentication Codes (MACs) are transmitted along with the synopsis to ensure integrity. SADA provides data freshness and integrity at a communication cost of O(1). Simulation results show that the SADA protocol incurs lower energy consumption and communication and computation cost compared to the state-of-the art protocols [1] [2].

[1]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Arbee L. P. Chen,et al.  Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting , 2012, IEEE Transactions on Knowledge and Data Engineering.

[3]  Haifeng Yu,et al.  DoS-resilient secure aggregation queries in sensor networks , 2007, PODC '07.

[4]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .

[5]  Philippe Flajolet,et al.  Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..

[6]  K. Venugopal,et al.  Performance of AODV Routing Protocol using Group and Entity Mobility Models in Wireless Sensor Networks , 2008 .

[7]  Yossi Matias,et al.  DIMACS Series in Discrete Mathematicsand Theoretical Computer Science Synopsis Data Structures for Massive Data , 2007 .

[8]  K. R. Venugopal,et al.  Wireless Sensor Networks Applications and Routing Protocols: Survey and Research Challenges , 2012, 2012 International Symposium on Cloud and Services Computing.

[9]  L M Patnaik,et al.  A flat routing protocol for sensor networks , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).

[10]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[11]  Arbee L. P. Chen,et al.  Efficient and robust sensor data aggregation using linear counting sketches , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[12]  Jeffrey Considine,et al.  Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.

[13]  K.R. Venugopal,et al.  Routing Protocol for Lifetime Maximization of Wireless Sensor Networks , 2006, 2006 International Conference on Advanced Computing and Communications.

[14]  Suman Nath,et al.  Secure outsourced aggregation via one-way chains , 2009, SIGMOD Conference.

[15]  Srinivasan Seshan,et al.  Synopsis diffusion for robust aggregation in sensor networks , 2004, SenSys '04.

[16]  Sushil Jajodia,et al.  Attack-resilient hierarchical data aggregation in sensor networks , 2006, SASN '06.