Efficient data aggregation with in-network integrity control for WSN

Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that more than 70% of energy is consumed in data transmission in WSN. Since most of the time, the sensed information is redundant due to geographically collocated sensors, most of this energy can be saved through data aggregation. Furthermore, data aggregation improves bandwidth usage and reduces collisions due to interference. Unfortunately, while aggregation eliminates redundancy, it makes data integrity verification more complicated since the received data is unique. In this paper, we present a new protocol that provides control integrity for aggregation in wireless sensor networks. Our protocol is based on a two-hop verification mechanism of data integrity. Our solution is essentially different from existing solutions in that it does not require referring to the base station for verifying and detecting faulty aggregated readings, thus providing a totally distributed scheme to guarantee data integrity. We carried out numerical analysis and simulations using the TinyOS environment. Results show that the proposed protocol yields significant savings in energy consumption while preserving data integrity, and outperforms comparable solutions with respect to some important performance criteria.

[1]  Peter Langendoerfer,et al.  On Concealed Data Aggregation for WSNs , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[2]  Shivakant Mishra,et al.  A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[3]  Yacine Challal,et al.  An efficient and highly resilient key management scheme for wireless sensor networks , 2010, IEEE Local Computer Network Conference.

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  M. Raina,et al.  Secure data aggregation using commitment schemes and quasi commutative functions , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[6]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[7]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.

[8]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[9]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[10]  Ian F. Blake,et al.  Advances in Elliptic Curve Cryptography: Preface , 2005 .

[11]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[12]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[13]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[14]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[15]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[16]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[17]  Patel Swapnil Secure Data Aggregation in Wireless Sensor Networks : A Survey , 2013 .

[18]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[19]  Ian F. Blake,et al.  Advances in Elliptic Curve Cryptography: Frontmatter , 2005 .

[20]  Yacine Challal,et al.  Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining , 2010, CCS '10.

[21]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[22]  Hailin Feng,et al.  Efficient Secure In-Network Data Aggregation in Wireless Sensor Networks , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[23]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[24]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[25]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[26]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[27]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[28]  S. Peter,et al.  On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .

[29]  Yacine Challal,et al.  Information Security in Wireless Sensor Networks , 2009 .

[30]  Rabindra Bista,et al.  A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.