Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks

Data aggregation is an important task in data centric heterogeneous wireless sensor networks because of its varying power and computational capabilities. Due to the deployment of sensor nodes in large numbers for different applications, a single node is not sufficient for performing data aggregation. Hence multiple nodes are required to summarize the relevant information from huge data sets. The process of data aggregation is vulnerable to many threats like loss of cryptographic keys, false data injection etc. To address these issues, we present the Secure Data Aggregation with Key Management (SDAKM) scheme. It provides a secure framework for the data centric heterogeneous wireless sensor networks using additive privacy homomorphism. It uses the heterogeneity of the sensor nodes for performing encrypted data processing and also provides an efficient key management scheme for data communication among sensor nodes in the network. This scheme offers higher security and has less computing overhead as it uses additive privacy homomorphism.

[1]  Josep Domingo-Ferrer,et al.  A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.

[2]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[3]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[4]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[5]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[6]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[7]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[8]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.

[9]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[10]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[11]  Deep Medhi,et al.  Modeling pairwise key establishment for random key predistribution in large-scale sensor networks , 2007, TNET.

[12]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[15]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[16]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.