Survey on secure data aggregation for wireless sensor networks

Data aggregation can significantly reduce the amount of data transmitted to the base station, therefore improve the energy efficiency and prolong the wireless network lifetime. However the sensor nodes may be deployed in remote and hostile environments where attackers may inject false information or forge aggregation values without being detected. Thus, security issue becomes an important research field in data aggregation for wireless sensor networks (WSNs). In this paper, the secure data aggregation schemes are categorized into hop by hop aggregation and end to end aggregation, and then the secure data aggregation schemes are reviewed and analyzed based on four phases: bootstrapping, data aggregation, verification and remedy. In addition, some topics for future search directions are pointed out.

[1]  J. Gardner,et al.  Microsensors, MEMS, and Smart Devices: Gardner/Microsensors, MEMS, and Smart Devices , 2001 .

[2]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[3]  Suat Özdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008, Comput. Commun..

[4]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[5]  Paul J.M. Havinga,et al.  A Dynamic Data Aggregation Scheme for Wireless Sensor Networks , 2003 .

[6]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[7]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[8]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[9]  Suat Özdemir,et al.  Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.

[10]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.

[11]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[12]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[13]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[14]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[15]  Naixue Xiong,et al.  Secure Data Aggregation in Wireless Sensor Networks: A Survey , 2006, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06).

[16]  D. Musiani,et al.  Active Sensing Platform for Wireless Structural Health Monitoring , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[17]  Rabindra Bista,et al.  A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[18]  Shiuh-Pyng Shieh,et al.  Secure encrypted-data aggregation for wireless sensor networks , 2010, Wirel. Networks.

[19]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[20]  Juan Manuel González Nieto,et al.  Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.

[21]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[22]  Jörg Widmer,et al.  In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.

[23]  Qi Qi,et al.  Wireless sensor networks in intelligent transportation systems , 2009, Wirel. Commun. Mob. Comput..

[24]  Ioana Rodhe,et al.  n-LDA: n-Layers Data Aggregation in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[25]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[26]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[27]  Naveen Verma,et al.  Design considerations for ultra-low energy wireless microsensor nodes , 2005, IEEE Transactions on Computers.

[28]  Refik Molva,et al.  Secure Data Aggregation with Multiple Encryption , 2007, EWSN.

[29]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .

[30]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[31]  J. Gardner,et al.  Microsensors, MEMS, and Smart Devices , 2001 .