An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks

Wireless sensor networks(WSNs) is a data-centric network where the querier is mostly concerned about the statistical aggregates (MAX/MIN, SUM, AVERAGE). A few protocols have been proposed for provably secure tree-based in-network data aggregation in WSN. However, these protocols all suffer from high communication overhead or long network delay when sending off-path values to each sensor node to independently verify that its own data was added into the final aggregation result. Since the off-path dissemination phase is the dominating factor, it is crucial to optimize this phase and save energy to increase the lifetime of network. In this paper, we propose a novel integrity preserving protocol Energy Efficient and Integrity-Preserving Aggregation Protocol (E2IPAP) for tree-based sensor network-s, aiming to provide a new approach for result-checking and reduce communication overhead. Analysis shows that, E2IPAP significantly reduces the overhead in disseminating off-path values and overall communication. E2IPAP has O(Δ log n) node congestion and is suitable for similar secure data aggregation protocols.

[1]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[2]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[4]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[7]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[8]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[9]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[10]  Panagiotis Papadimitratos,et al.  Efficient and Robust Secure Aggregation for Sensor Networks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.

[11]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[12]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[13]  Rui Zhang,et al.  PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Murat Demirbas,et al.  The impact of data aggregation on the performance of wireless sensor networks , 2008 .

[15]  Murat Demirbas,et al.  The impact of data aggregation on the performance of wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[16]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[17]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[18]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[19]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[20]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.