Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol

In many applications of Wireless Sensor Networks a Sink is interested in aggregated data instead of exact values from all sensors. To send aggregated data, it is also helpful to reduce the amount of data to be transmitted and thereby conserve energy. Indeed current in-network aggregation schemes are helpful to conserve energy but they are designed without considering possible security issues related to data privacy. Often we find wireless sensor networks designed with neighbouring nodes sharing keys or with decryption at aggregator nodes. In either situation the potential for aggregator nodes to be physically compromised means data privacy is at high risk. Therefore secure data aggregation is desirable where data can be aggregated without the need for decryption at aggregator nodes. Aggregation becomes especially challenging if end-to-end privacy between a source and a destination (sink or group leader) is required. In this paper we extend our Structure and Density Independent Group Based Key Management Protocol with the additional feature of secure data aggregation to provide better data privacy to every single node in a large scale Wireless Sensor Network.

[1]  David,et al.  Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks , 2007 .

[2]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[3]  Dirk Westhoff,et al.  Secure comparison of encrypted data in wireless sensor networks , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[4]  Hasan Çam,et al.  Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..

[5]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[6]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[7]  Srinivasan Seshan,et al.  Cache-and-query for wide area sensor databases , 2003, SIGMOD '03.

[8]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[9]  Anish Mathuria,et al.  Efficient Secure Aggregation in Sensor Networks , 2004, HiPC.

[10]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[11]  Deborah Estrin,et al.  Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[12]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[13]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[14]  S. Peter,et al.  On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .

[15]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[16]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.

[17]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[18]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.