Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks

Efficient and privacy-preserving data aggregation in a wireless sensor network (WSN) poses a tremendous challenge: how to cope with sensors compromise---once a sensor is compromised, its crypto material is compromised and so is privacy of aggregate data. To address this challenge, we propose two operationally simple and privacy-preserving protocols: PASKOS (Privacy-preserving based on Anonymously Shared Keys and Omniscient Sink) and PASKIS (Privacy-preserving based on Anonymously Shared Keys and Ignorant Sink). They leverage the idea that each node adds to its private sensed value a keyed value (computed from anonymously shared keys) and only uses the resulting sum in the data aggregation process. Our protocols guarantee that the sink is able to efficiently retrieve the aggregated original data by removing keyed values from the received aggregate while preserving the privacy of the aggregated data. Further, both protocols guarantee a high {\em data-loss resilience}---the sink retrieves the aggregate of the sensed values of only those nodes who actually participated in the aggregation process.\\* PASKOS effectively protects the privacy of any node against other nodes, by requiring $O(\log N)$ communication cost in the worst case and $O(1)$ on average, and requiring $O(1)$ memory and computation cost. PASKIS can even protect a node's privacy against a compromised sink, and it is more efficient, requiring only $O(1)$ overhead as for computation, communication, and memory; however, these gains in efficiency are traded-off with a (slightly) decreased level of privacy. Through formal analysis and simulations, we demonstrate the superior performance of our protocols against existing solutions in terms of privacy-preserving effectiveness, efficiency, and accuracy of computed aggregation.

[1]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[2]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[3]  Roberto Di Pietro,et al.  Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.

[4]  Sang Hyuk Son,et al.  Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges , 2005 .

[5]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[6]  Sushil Jajodia,et al.  Secure median computation in wireless sensor networks , 2009, Ad Hoc Networks.

[7]  Emiliano De Cristofaro,et al.  Privacy-Preserving Querying in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[8]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Sushil Jajodia,et al.  Attack-resilient hierarchical data aggregation in sensor networks , 2006, SASN '06.

[10]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[12]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[13]  R. Di Pietro,et al.  FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.

[14]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[15]  Alex Delis,et al.  Outlier-Aware Data Aggregation in Sensor Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[16]  David Sun,et al.  COUGAR: the network is the database , 2002, SIGMOD '02.

[17]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[18]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[19]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[20]  Emiliano De Cristofaro,et al.  Privacy-Preserving Policy-Based Information Transfer , 2009, Privacy Enhancing Technologies.

[21]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[22]  Gene Tsudik,et al.  QUEST Software and , 2022 .