Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks

Since wireless sensor networks (WSNs) are resources-constrained, it is very essential to gather data efficiently from the WSNs so that their life can be prolonged. Data aggregation can conserve a significant amount of energy by minimizing transmission cost in terms of the number of data packets. Many applications require privacy and integrity protection of the sampled data while they travel from the source sensor nodes to a data collecting device, say a query server. However, the existing schemes suffer from high communication cost, high computation cost and data propagation delay. To resolve the problems, in this paper, we propose a new and efficient integrity protecting sensitive data aggregation scheme for WSNs. Our scheme makes use of the additive property of complex numbers to achieve sensitive data aggregation with protecting data integrity. With simulation results, we show that our scheme is much more efficient in terms of both communication and computation overheads, integrity checking and data propagation delay than the existing schemes for protecting integrity and privacy preserving data aggregation in WSNs.

[1]  Gustavus J. Simmons,et al.  An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .

[2]  K. Nahrstedt,et al.  iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[3]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[4]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[5]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[6]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[7]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[8]  Rabindra Bista,et al.  A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[9]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  Martina Zitterbart,et al.  An efficient key establishment scheme for secure aggregating sensor networks , 2006, ASIACCS '06.

[11]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[13]  Hung-Min Sun,et al.  Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures , 1999, J. Inf. Sci. Eng..

[14]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[15]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[16]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[17]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[18]  Sushil Jajodia,et al.  Privacy-preserving robust data aggregation in wireless sensor networks , 2009, Secur. Commun. Networks.

[19]  Xue Liu,et al.  A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[20]  Jeffrey Considine,et al.  Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.

[21]  Wei Hong,et al.  TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.

[22]  Kotagiri Ramamohanarao,et al.  Inverted files versus signature files for text indexing , 1998, TODS.

[23]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.