An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

[1]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[2]  Brian J. Matt,et al.  Finding Invalid Signatures in Pairing-Based Batches , 2007, IMACC.

[3]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[4]  Salah A. Aly,et al.  Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.

[5]  R. Jueneman,et al.  Message authentication , 1985, IEEE Communications Magazine.

[6]  Shiuh-Pyng Shieh,et al.  Secure encrypted-data aggregation for wireless sensor networks , 2010, Wirel. Networks.

[7]  Gustavus J. Simmons,et al.  Symmetric and Asymmetric Encryption , 1979, CSUR.

[8]  Suat Ozdemir,et al.  Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism , 2007, IEEE International Conference on Pervasive Services.

[9]  Zhenfu Cao,et al.  Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol , 2008, IEEE Communications Letters.

[10]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[11]  H. Cam,et al.  SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[12]  Josna Jose,et al.  A SURVEY ON SECURE DATA AGGREGATION PROTOCOLS IN WIRELESS SENSOR NETWORKS , 2012 .

[13]  Krishnan Murugan,et al.  Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks , 2010, CNSA.

[14]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[15]  Gelareh Taban,et al.  Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[16]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[17]  Kyung-Ah Shim,et al.  A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[18]  Miguel Garcia,et al.  GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks , 2008, Journal of Computer Science and Technology.

[19]  J. Lloret,et al.  A Group-Based Protocol for Large Wireless AD-HOC and Sensor Networks , 2008, NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops.

[20]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[21]  Azeddine Bilami,et al.  A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs , 2015, IEEE Communications Letters.

[22]  Angela M. Mielke,et al.  Heterogeneous Wireless Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.

[23]  Wei Zhang,et al.  Deploying a Heterogeneous Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[25]  Azeddine Bilami,et al.  SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs , 2016, Telecommun. Syst..

[26]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[27]  Kavit Shah Secure data aggregation protocol for sensor networks , 2015 .

[28]  Aldar C.-F. Chan,et al.  Symmetric-Key Homomorphic Encryption for Encrypted Data Processing , 2009, 2009 IEEE International Conference on Communications.