Trustworthy and protected data collection for event detection using networked sensing systems

Data collection in wireless networked sensing systems (WNSS) is usually not reliable due to sensor faults and/or security attacks. This makes detection of an event (e.g., structural damage) through data aggregation unreliable. In this paper, we propose a trustworthy and protected data collection (TPDC) framework for event detection in WNSS. This framework facilitates reliable data for aggregation at clusters of WNSS. The key idea of TPDC is to allow a cluster head to check whether or not the transmitted data is trustworthy (i.e., unaltered estimated at the sensor node level) and protected (i.e., received without alteration after the transmission) before aggregating the data at a cluster. For the trustworthy data, we propose an algorithm to make sure that transmitted data is unaltered. For the protected data, we present a truth discovery approach, whose goal is to infer truthful facts from unreliable sensor data. Through simulations, we demonstrate that the collected data in TPDC is trustworthy and protected that can make aggregation for event detection reliable.

[1]  Dan Wang,et al.  High Quality Sensor Placement for SHM Systems: Refocusing on Application Demands , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Bo Zhao,et al.  Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation , 2014, SIGMOD Conference.

[3]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[4]  Mingchu Li,et al.  Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[5]  Jie Wu,et al.  Collusion Attack Detection in Networked Systems , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[6]  Yi-Qing Ni,et al.  Technology innovation in developing the structural health monitoring system for Guangzhou New TV Tower , 2009 .

[7]  Guoliang Xing,et al.  Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks , 2012, IEEE Transactions on Mobile Computing.

[8]  Jie Wu,et al.  Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[9]  R. Cramer,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000 .

[10]  Jean-Pierre Corriveau,et al.  Resilient Secure Localization and Detection of Colluding Attackers in WSNs , 2012, ADHOC-NOW.

[11]  Bo Zhao,et al.  A Survey on Truth Discovery , 2015, SKDD.

[12]  Jie Wu,et al.  Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.

[13]  Levente Buttyán,et al.  CORA: Correlation-based resilient aggregation in sensor networks , 2009, Ad Hoc Networks.

[14]  Jie Wu,et al.  Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring , 2015, IEEE Trans. Computers.

[15]  Zhijun Li,et al.  AirCloud: a cloud-based air-quality monitoring system for everyone , 2014, SenSys.

[16]  Dan Wang,et al.  Distributed Faulty Sensor Detection , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[17]  Nigatu Mitiku Danna,et al.  Data Processing Algorithms in Wireless Sensor Networks får Structural Health Monitoring , 2012 .

[18]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[19]  Levente ButtyP CORA: Correlation-based Resilient Aggregation in Sensor Networks , 2008 .

[20]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[21]  Yunghsiang Sam Han,et al.  Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks , 2008, IEEE Transactions on Computers.

[22]  Chao Yang,et al.  Energy efficient clustering for WSN-based structural health monitoring , 2011, 2011 Proceedings IEEE INFOCOM.

[23]  Tsung-Chih Hsiao,et al.  Factor Knowledge Mining Using the Techniques of AI Neural Networks and Self-Organizing Map , 2015, Int. J. Distributed Sens. Networks.

[24]  Parameswaran Ramanathan,et al.  Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.