144 research outputs found

    Secure data aggregation in wireless sensor networks: A survey

    Get PDF
    Data aggregation is a widely used technique in wireless sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There has been many related work proposed to address these security issues. In this paper we survey these work and classify them into two cases: hop-by-hop encrypted data aggregation and end-to-end encrypted data aggregation. We also propose two general frameworks for the two cases respectively. The framework for end-to-end encrypted data aggregation has higher computation cost on the sensor nodes, but achieves stronger security, in comparison with the framework for hop-by-hop encrypted data aggregation.Yingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan, Naixue Xion

    Secure Data Aggregation in Wireless Sensor Networks. Homomorphism versus Watermarking Approach

    No full text
    International audienceWireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. Hence, transmissions are a very energy consuming operation. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, usually the carried information contains confidential data. Therefore, an end-to-end secure aggregation approach is required to ensure a healthy data reception. End-to-end encryption schemes that support operations over cypher-text have been proved important for private party sensor network implementations. These schemes offer two main advantages: end-to-end concealment of data and ability to operate on cipher text, then no more decryption is required for aggregation. Unfortunately, nowadays these methods are very complex and not suitable for sensor nodes having limited resources. In this paper, we propose a secure end-to-end encrypted-data aggregation scheme. It is based on elliptic curve cryptography that exploits a smaller key size. Additionally, it allows the use of higher number of operations on cypher-texts and prevents the distinction between two identical texts from their cryptograms. These properties permit to our approach to achieve higher security levels than existing cryptosystems in sensor networks. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead and can be practically implemented in on-the-shelf sensor platforms. By using homomorphic encryption on elliptic curves, we thus have realized an efficient and secure data aggregation in sensor networks. Lastly, to enlarge the aggregation functions that can be used in a secure wireless sensor network, a watermarking-based authentication scheme is finally proposed

    Energy efficient clustering and secure data aggregation in wireless sensor networks

    Get PDF
    Communication consumes the majority of a wireless sensor network\u27s limited energy. There are several ways to reduce the communication cost. Two approaches used in this work are clustering and in-network aggregation. The choice of a cluster head within each cluster is important because cluster heads use additional energy for their responsibilities and that burden needs to be carefully distributed. We introduce the energy constrained minimum dominating set (ECDS) to model the problem of optimally choosing cluster heads in the presence of energy constraints. We show its applicability to sensor networks and give an approximation algorithm of O(log n) for solving the ECDS problem. We propose a distributed algorithm for the constrained dominating set which runs in O(log n log [triangle]) rounds with high probability. We show experimentally that the distributed algorithm performs well in terms of energy usage, node lifetime, and clustering time and thus is very suitable for wireless sensor networks. Using aggregation in wireless sensor networks is another way to reduce the overall communication cost. However, changes in security are necessary when in- network aggregation is applied. Traditional end-to-end security is not suitable for use with in-network aggregation. A corrupted sensor has access to the intermediate data and can falsify results. Additively homomorphic encryption allows for aggregation of encrypted values, with the result being the same as the result as if unencrypted data were aggregated. Using public key cryptography, digital signatures can be used to achieve integrity. We propose a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in- network aggregation in wireless sensor networks. We prove that our digital signature algorithm which is based on Elliptic Curve Digital Signature Algorithm (ECDSA) is at least as secure as ECDSA. Even without in-network aggregation, security is a challenge in wireless sensor networks. In wireless sensor networks, not all messages need to be secured with the same level of encryption. We propose a new algorithm which provides adequate levels of security while providing much higher availablility [sic] than other security protocols. Our approach uses similar amounts of energy as a network without security --Abstract, page iv

    DRFSD: Directed Restricted Flooding For Secure Data-Aggregation In Wireless Sensor Networks

    Get PDF
    Secured Data Transmission is a major issue in Wireless Sensor Networks (WSNs). In this paper we have proposed Directed Restricted Flooding Protocol (DRFSD) in WSNs. This protocol is better than H-SPREAD (Hybrid Security Protocol for REliable dAta Delivery). In DRFSD, alternate multipaths are selected based on the sensor node, that are placed at 180? direction with the Base Station (BS). This scheme is ef?cient in sending the Data Packets to the Base Station in shorter duration than the H-SPREAD. Simulation Results show that our algorithm approach performs well with respect to latency in comparison with earlier algorithm

    Robust Aggregation Mechanism in WSN for Mitigating Attacks

    Get PDF
    Wireless Sensor Network (WSN) is a collection of sensor nodes connected to base station which is characterized by many to one communication. Many sensor nodes will send data to base station making it many to on communication. The sensor nodes can act as sender and receiver of data as the data is sent to base station through intermediary nodes. The nodes are resource constrained as they are deployed in hostile environment or environment where resources are limited. The nodes are expected to participate in sensing or surveillance. WSNs are widely used in civilian and military applications for sending data and surveillance. As WSN is becoming increasingly popular, security needs to be provided in the network as the nodes are vulnerable to various attacks. Since the nodes are energy constrained, it is very useful to use some aggregation technique in order to reduce communication overhead and also energy consumption. Recently Roy et al. focused on aggregation in WSN for filtering out the impact of attackers on the network. Their focus was to use aggregation in WSN in order to reduce communication overhead and reduce the impact of attacks on WSN. In this paper we implement a variant of protocol that takes care of secure communications over WSN besides reducing energy consumption and mitigating attack impact. The simulation results are encouraging DOI: 10.17762/ijritcc2321-8169.15065

    Hybrid Approach for Data Aggregation in WSN with Advance Security Protocol in NS2 Software

    Get PDF
    Energy efficiency is a crucial resource constrained WSN. Diverse techniques for example duty cycling, optimization energy scheduling and data aggregation are applied so that energy can be used minimum. In this research paper there are two main domains on which work carried out successfully. First one is data aggregation but data aggregation in our work is of two levels. Another domain was security because as we know in MANET security is not up to the mark that is why unauthorized person can access the data by deploying malicious note in our existing network. A robust analytical development of the proposed protocol is presented by using concept of two level data aggregation. Quiet satisfactory performance of the proposed algorithm is depicted. Data aggregation is attained by iteratively applying the proposed compression method at the cluster heads and on the other hand data aggregation scheme in the presence of a Multi-interface Multi-Channel Routing Protocol is tested. One important thing is that in a cluster. A node can be cluster head only single time after that new node will be cluster head. MMCR uses a metric defined by various parameters like throughput, end-to-end delay and energy utilization to select Multi-Point Relay nodes to forward data packets in each channel but keeping in mind that loss of packet or information must be reduced. Finally we can say that proposed algorithm is far better than existed protocol. Besides that RSA security algorithm for encryption and decryption also applied so that unauthorized person cannot access the information. There are various security algorithm available but selection must be appropriate as per desired application

    Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem

    Get PDF
    A new method of lossless Secure Data Aggregation for Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the popular Chinese Remainder theorem. Here, an ‘Augmented Chinese Remainder System’ is introduced that incorporates additional features to enforce a higher level of security to the aggregated data. The scheme provides inbuilt signature verification and eliminates the need for separate data validation algorithms. The method achieves data integrity and authentication simultaneously in addition to data aggregation for the data forwarded from the Cluster Head to the Base Station. The aggregate contains the entire individual data in the encrypted form and the receiver de-aggregates it to get the original data in full. The Augmented Chinese Remainder System can be extended to secure Multi-level Data Aggregation for WSN

    Emerging Communications for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide
    • …
    corecore