A Trust-Based Secure Data Aggregation Protocol for Wireless Sensor Networks

Generally, the security issues in data aggregation of Wireless Sensor Networks (WSNs) are: data confidentiality and data integrity. Data confidentiality, which protects the sensitive transmitted data from the passive attacks such as eavesdropping, is the basic security issue. Data integrity prevents the compromised source nodes or aggregator nodes from significantly altering the final aggregation value. This paper proposes a trust-based secure data aggregation protocol for WSN. It does not involve any centralized infrastructure. It uses Combined Trust Values (CTVs) to favor packet forwarding for each node. In the proposed scheme, each sensor node has a CTV which is based on the trust evaluation factors, such as identification, sensing data and consistency. Based on these factors, one can identify malicious or compromised nodes, and filter their data from the networks. Each aggregator determines a Message Authentication Code (MAC) value for the aggregated data and finally all the aggregated data reach the sink node. By verifying the MAC value of the aggregators, the sink identifies and eliminates the misbehaving aggregators. The simulation results show that the proposed protocol achieves good delivery ratio and throughput.

[1]  K. Nahrstedt,et al.  iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[2]  Naixue Xiong,et al.  Secure Data Aggregation in Wireless Sensor Networks: A Survey , 2006, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06).

[3]  Shiuh-Pyng Shieh,et al.  Secure encrypted-data aggregation for wireless sensor networks , 2010, Wirel. Networks.

[4]  R. S. Ramakrishna,et al.  A Level-based Key Management for both In-Network Processing and Mobility in WSNs , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[5]  Jukka Kohonen,et al.  Data Gathering in Sensor Networks ∗ , .

[6]  Ludmila Scharf Data Gathering in Sensor Networks , 2007, Algorithms for Sensor and Ad Hoc Networks.

[7]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[8]  Deborah Estrin,et al.  The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[9]  Baochun Li,et al.  Loss inference in wireless sensor networks based on data aggregation , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[10]  Shiuh-Pyng Shieh,et al.  SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[11]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[12]  Lalit M. Patnaik,et al.  Secure Data Aggregation Using Clusters in Sensor Networks , 2009 .

[13]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[14]  Attila Vidács,et al.  Distributed Data Agregation with Geographical Routing in Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.

[15]  Alhussein A. Abouzeid,et al.  Optimal Policies for Distributed Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Attila Vidács,et al.  Distributed Data Aggregation with Geographical Routing in Wireless Sensor Networks , 2007 .

[17]  Prasun Sinha,et al.  Structure-Free Data Aggregation in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[18]  John A. Clark,et al.  Threat Modelling for Mobile Ad Hoc and Sensor Networks , 2009 .