Trusted Data Aggregation with Low Energy in Wireless Sensor Networks

— Scientific researches advancements achieving miniaturization of Micro-electromechanical Systems, has enable smarts autonomous embedded devices know as sensor nodes, that are developed on numerous platforms using the proprietary of hardware and software with capability to communicate wirelessly. Today more than ever these sensors are continuously spreading to civilian usage side of things and in many others applications , including military, security, medical, environments, and animal among others, to sense specific occurrence of desired event and may carried very important data on physical device such as the mica-mote. Hence a plethora of security protocols arises in order to mitigate the risks of malicious attacks such as eavesdrop communications, or data alteration, using cryptographic techniques such as Elliptic curve for data privacy, accuracy, integrity, efficiency, and reducing the energy consumption by mote and processors. We focus on securing data by all means. Hence the in-network processing technique is used to reduce considerably the energy consumption, considering that sensors deployments in inaccessible and resource-constrained environments. After the drawback, we investigate the secured data aggregation and give security requirements that are mandatory to a Trusted Data Aggregation with Low Energy model to satisfy. The security and energy performances are analysed comparing with others methods. Index Terms—TDALE, Aggregation, Elliptic curve, RSA, Security, Energy

[1]  Christos G. Christodoulou,et al.  Radio propagation and adaptive antennas for wireless communication links : terrestrial, atmospheric and lonospheric [i.e. ionospheric] , 2007 .

[2]  Kamarulzaman Ab. Aziz,et al.  Wireless Sensor Networks for Search and Rescue Operations , 2011 .

[3]  Yuxin Mao,et al.  A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks , 2013, Int. J. Distributed Sens. Networks.

[4]  Jacques M. Bahi,et al.  Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach , 2010, ADHOCNETS.

[5]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[6]  Christos G. Christodoulou,et al.  Radio Propagation and Adaptive Antennas for Wireless Communication Networks: Terrestrial, Atmospheric, and Ionospheric , 2014 .

[7]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[8]  Arash Ahmadi,et al.  Reducing Energy Consumption in Wireless Sensor Networks Using Hash Distribution Table , 2013 .

[9]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[10]  Doohwan Oh,et al.  A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems , 2013, Sensors.

[11]  Tristan Daladier Engouang,et al.  Pallier Based Homomorphic Encrypted Data Aggregation in Wireless Sensor Networks , 2014 .

[12]  Kamarulzaman Ab. Aziz,et al.  Coverage Strategies for Wireless SensorNetworks , 2009, Journal of Science and Technology.

[13]  Yun Liu,et al.  High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..

[14]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[15]  Tristan Daladier Engouang,et al.  Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks , 2013, 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA).

[16]  Chris Townsend CHAPTER 22 – Wireless Sensor Networks: Principles and Applications , 2004 .