Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks

Compressive sensing (CS) has been viewed as a promising technology to greatly improve the communication efficiency of data gathering in wireless sensor networks. However, this new data collection paradigm may bring in new threats but few study has paid attention to prevent information leakage during compressive data gathering. In this paper, we identify two statistical inference attacks and demonstrate that traditional compressive data gathering may suffer from serious information leakage under these attacks. In our theoretical analysis, we quantitatively analyze the estimation error of compressive data gathering through extensive statistical analysis, based on which we propose a new secure compressive data aggregation scheme by adaptively changing the measurement coefficients at each sensor and correspondingly at the sink without the need of time synchronization. In our analysis, we show that the proposed scheme could significantly improve data confidentiality at light computational and communication overhead.

[1]  Sanjay Kumar Madria,et al.  Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.

[2]  Hyrum S. Anderson,et al.  On Discovering the Compressive Sensing Matrix From Few Signal/Measurement Pairs. , 2011 .

[3]  Xue Liu,et al.  A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[4]  Robert D. Nowak,et al.  Compressive wireless sensing , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[5]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[6]  Cyrus Shahabi,et al.  The Clustered AGgregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks , 2007, TOSN.

[7]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[8]  Babak Seyfe,et al.  Perfect Secrecy Using Compressed Sensing , 2010, ArXiv.

[9]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[10]  Zixiang Xiong,et al.  Distributed source coding for sensor networks , 2004, IEEE Signal Processing Magazine.

[11]  Sriram Vishwanath,et al.  Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.

[12]  Deanna Needell,et al.  Uniform Uncertainty Principle and Signal Recovery via Regularized Orthogonal Matching Pursuit , 2007, Found. Comput. Math..

[13]  R. Nowak,et al.  Compressed Sensing for Networked Data , 2008, IEEE Signal Processing Magazine.

[14]  Maria E. Orlowska,et al.  On the Optimal Robot Routing Problem in Wireless Sensor Networks , 2007 .

[15]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Baochun Li,et al.  A Distributed Framework for Correlated Data Gathering in Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[17]  Wei Cheng,et al.  A Monte Carlo Method for Mobile Target Counting , 2011, 2011 31st International Conference on Distributed Computing Systems.

[18]  Vishnu Navda,et al.  Efficient gathering of correlated data in sensor networks , 2008, TOSN.

[19]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[20]  A. Ortega,et al.  Energy-efficient data representation and routing for wireless sensor networks based on a distributed wavelet compression algorithm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[21]  Antonio Ortega,et al.  Energy-efficient data representation and routing for wireless sensor networks based on a distributed wavelet compression algorithm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[22]  Kannan Ramchandran,et al.  A distributed and adaptive signal processing approach to reducing energy consumption in sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Xiuzhen Cheng,et al.  Localized Outlying and Boundary Data Detection in Sensor Networks , 2007 .

[24]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[25]  Babak Seyfe,et al.  Perfect secrecy via compressed sensing , 2010, 2013 Iran Workshop on Communication and Information Theory.

[26]  Catherine Rosenberg,et al.  Does Compressed Sensing Improve the Throughput of Wireless Sensor Networks? , 2010, 2010 IEEE International Conference on Communications.

[27]  Jun Sun,et al.  Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.

[28]  Xiuzhen Cheng,et al.  Fault tolerant target tracking in sensor networks , 2009, MobiHoc '09.

[29]  Xiuzhen Cheng,et al.  A statistical approach for target counting in sensor-based surveillance systems , 2012, 2012 Proceedings IEEE INFOCOM.

[30]  Xiuzhen Cheng,et al.  Robust Compressive Data Gathering in Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[31]  Shaojie Tang,et al.  Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks , 2012, IEEE/ACM Transactions on Networking.

[32]  Patel Swapnil Secure Data Aggregation in Wireless Sensor Networks : A Survey , 2013 .

[33]  Fang Liu,et al.  Location-centric storage for safety warning based on roadway sensor networks , 2007, J. Parallel Distributed Comput..

[34]  Jian Pei,et al.  An Energy-Efficient Data Collection Framework for Wireless Sensor Networks by Exploiting Spatiotemporal Correlation , 2007, IEEE Transactions on Parallel and Distributed Systems.

[35]  Joel A. Tropp,et al.  Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.

[36]  Binbin Chen,et al.  Secure Aggregation with Malicious Node Revocation in Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.

[37]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[38]  Athanasios V. Vasilakos,et al.  Compressed data aggregation for energy efficient wireless sensor networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[39]  Shaojie Tang,et al.  Data gathering in wireless sensor networks through intelligent compressive sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[40]  Mark Crovella,et al.  Graph wavelets for spatial traffic analysis , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[41]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[42]  Xiuzhen Cheng,et al.  Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach , 2009, IEEE INFOCOM 2009.

[43]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[44]  Chang Wen Chen,et al.  Correlated data gathering in wireless sensor networks based on distributed source coding , 2008, Int. J. Sens. Networks.

[45]  Yingshu Li,et al.  Sparse target counting and localization in sensor networks based on compressive sensing , 2011, 2011 Proceedings IEEE INFOCOM.