Secure hierarchical in network aggregation in sensor networks pdf

Secure hierarchical innetwork aggregation in sensor networks. Securing node capture attacks for hierarchical data aggregation in. Efficient and optimally secure innetwork aggregation in. A survey on privacy preserving data aggregation protocols for. The proposed solutions use of cryptography is kept at. Secure innetwork aggregation can detect such manipulation 2. Abstract secure hierarchical innetwork aggregation in sensor networks. Under this solution, a sensor network continues to work normally until an attack is suspected. Based on distance to sensor nodes and its energy level the aggregator detects the node. The proposed methodology deals with mac authentication scheme for secure data. Request pdf secure hierarchical data aggregation in wireless sensor networks.

Similar to 5 it requires the construction of the aggregation tree structure e. Performance analysis of secure hierarchical data aggregation. In sensor networks, data aggregation is a vital primitive enabling efficient data queries. The first algorithm for provably secure hierarchical innetwork data aggregation.

However, the previous optimally secure in network aggregation protocols against multiple corrupted nodes require two roundtrip communications between each node and the base station, including the resultchecking phase whose congestion is \\cal o\log n\ where n is the total number of sensor nodes. We elaborate on data aggregation and security in wireless sensor networks in section 3. A number of hierarchical secure schemes 911, 14, 16 have been proposed for innetwork aggregation on tree topology, where each node computes an intermediate aggregation result. Performance evaluation and analysis secure data aggregation in wireless sensor networks has two contrasting. Background in sensor networks, data aggregation provides energy savings.

Later research efforts, such as the secure hierarchical in network aggregation shia protocol 3 and its enhanced variation 9, as well as the secoa secure aggregation protocol 19, have started to consider multilevel in network aggregation setting where more than one sensor may be compromised. Wireless sensor network, security, hierarchical data aggregation. Tag is an in network aggregation service for tinyos motes that supports a sqllike language for expressing aggregation queries over streaming sensor data 14. We suggest an energy constrained secure hierarchical data aggregation in wireless sensor networks. Optimized secure data aggregation in wireless sensor networks. A number of hierarchical secure schemes 911, 14, 16 have been proposed for innetwork aggregation on tree topology, where each node computes an intermediate aggregation result accounting for the sensor readings of nodes in the subtree rooted at it.

Secure hierarchical data aggregation in wireless sensor networks abstract. Secure and efficient hierarchical data aggregation in wireless sensor networks. An approach for data aggregation strategy in wireless. Pdf aggregation scheme with secure hierarchical clustering. We elaborate on data aggregation and security in wireless sensor networks in. Secure and energyefficient clustering scheme saeecs. We present and implement the secure data aggregation algorithm on mica2 and telosb sensor network platforms and measure the execution time and energy. Secure hierarchical data aggregation is expected to pro duce a vast. An ultra hierarchical clusteringbased secure aggregation protocol for wireless sensor networks sebastien faye, jean frederic myoupo advances in information sciences and service sciencesaiss volume3, number9, october 2011 doi. We provide security analysis of the algorithm in section v. Recently, privacy homomorphism based secure data aggregation schemes have been proposed to achieve seamless integration of data con. Secure data aggregation in wireless sensor networks ieee. Using innetwork data aggregation, sensor data from multiple nodes can be combined before being forwarded to neighboring nodes. We are using an additively digital signature algorithm based on ecdsa to achieve integrity of the aggregate result.

Data aggregation is a technique used to conserve battery power in wireless sensor networks wsn. Recently, secure innetwork aggregation in wireless sensor networks becomes a challenge issue, there is an extensive research on this area due to the large number of applications where the sensors. A solution for integrity preserving data aggregation in wireless sensor networks. Secure aggregation with malicious node revocation in sensor.

In contrast, the standard threat model in sensor network security assumes that an attacker may control a fraction of the nodes, which may misbehave in an arbitrary byzantine manner. Due to the broadcast nature of the transmission media they use, sensor networks are vulnerable to various security attacks, such as eavesdropping. Secure aggregation with malicious node revocation in. Secure data aggregation in wireless sensor networks mathunipd. Hierarchical secure data aggregation combine the data from various sources, redirect it with the removal of the redundancy and thereby reducing the number of transmissions and also saves energy. Energy efficient clustering and secure data aggregation in. In our framework certain nodes in the sensor network, called aggregators, help aggregating.

Secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, innetwork data aggregation significantly reduces the amount of communication and energy. In this direction, the secure hierarchical innetwork aggregation shia scheme 2 achieves detection of any manipulation of the innetwork aggregation, without assuming a particular data. In untrusted environments, sensors may potentially be compromised. At first the network was divided into clusters, each cluster begins with an aggregator and aggregator was connected to sink. Optimized security of data aggregation technique using a. For our work, we assume a simple hierarchical tree aggregation, but our protocol could readily be adapted to any hierarchical aggregation protocol. Secure continuous aggregation in wireless sensor networks. Using aggregation in wireless sensor networks is another way to reduce the overall communication cost. A wireless sensor network wsn is a wireless network consisting of spatially distributed autonomous devices that use. Secure and efficient hierarchical data aggregation in. In a largescale wireless sensor network, a topology is needed to gather statebased data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal. Innetwork aggregation is an essential primitive for performing queries on sensor network data. Optimal security is achieved via interactive computation of the.

Sep 14, 20 secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, in network data aggregation significantly reduces the amount of communication and energy consumption. In contrast, hierarchical aggregation approaches make use of in network. Wireless sensor network could not deploy the hostile and uncontrolled environment. However, the previous optimally secure innetwork aggregation protocols against multiple corrupted nodes require two roundtrip communications between each node and the base station, including the. A secure data aggregation approach in hierarchical. An ultra hierarchical clusteringbased secure aggregation. We present the first algorithm for provably secure hierarchical innetwork data aggregation. In the secure data aggregation techniques, reduction in the energy consumption was not elaborated in detail, since aggregator means of connection to sink was either direct or through other aggregators which need. A short survey on secure routing protocols in hierarchical. Secure aggregation techniques several secure aggregation algorithms have been proposed assuming that the bs is the only aggregator node in the network 18, 19, 20. We present the first algorithm for provably secure hierarchical in network data aggregation. Hierarchical secure aggregation 2, 10 assumes that the exact set of livereachablesensors is known.

Resilient aggregation in simple linear sensor networks kevin j. In large sensor networks, computing aggregates innetwork, i. Aggregation scheme with secure hierarchical clustering for wireless sensor networks article pdf available in international journal of distributed sensor networks 2012155029 july 2012. But in situations where sensor nodes privacy is nonnegotiable, data aggregation cannot be implemented at the cost of security. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation result is corrupted by an attacker. Resilient aggregation in simple linear sensor networks. However, changes in security are necessary when in network aggregation is applied. The inbuilt redundancy in the raw data gathered from various sensor nodes can be banned by the in network data aggregation. However, changes in security are necessary when innetwork aggregation is. Haowen chan carnegie mellon school of computer science. An approach used by several data acquisition systems 16,31 for sensor networks is to construct a spanning tree rooted. However, information aggregation in sensor networks is complicated by the fact that the sensor nodes and aggregators may be compromised.

Stinson abstract a sensor network is a network comprised of many small, wireless, resourcelimited nodes that sense. Proceedings of the sixth australasian information security conference aisc 2008. Energy constrained secure hierarchical data aggregation in. Later research efforts, such as the secure hierarchical innetwork aggregation shia protocol 3 and its enhanced variation 9, as well as the secoa secure aggregation protocol 19, have. Communication in wireless sensor networks uses the majority of a sensors limited energy. Wireless sensor networks, secure routing protocols, cluster head purpose the efficient routing of information. Secure and energyefficient data aggregation in wireless sensor networks jaydip sen member, acm kolkata, india email. Hierarchical concealed data aggregation for wireless sensor.

Energyefficient routing and secure communication in wireless. Provably secure framework for information aggregation in sensor networks 3 the previous one mainly by a fully distributed resultchecking phase without relying on probabilistic security. The first algorithm for provably secure hierarchical in network data aggregation. Secure data aggregation protocol with byzantine robustness.

Using aggregation in wireless sensor network reduces the overall communication cost. Data aggregation in wireless sensor networks jin cui to cite this version. Recently, privacy homomorphism based secure data aggregation. In proceedings of the acm conference on computer and communications security ccs 2006 modeling adoptability of secure bgp protocols haowen chan, debabrata dash, adrian perrig, hui zhang. Abstractin wireless sensor networks, performing data aggregation while preserving data con. Secure hierarchical data aggregation in wireless sensor. Index termsbase station, data aggregation, hierarchical ag gregation, in network aggregation, sensor network security, syn opsis diffusion. Secure hierarchical data aggregation in wireless sensor networks general framework priti1, suman2 1deptt. Hu and evans 14 propose a secure aggregation scheme against one single. Data aggregation is an approach which supports lifetime of the wireless sensor networks wsns against the limited energy. Secure hierarchical data aggregation in wireless sensor networks. A new approach to secure data aggregation protocol for wireless sensor network. The proposed solutions use of cryptography is kept at a minimum to ensure maximum secure bandwidth.

Our algorithm is guaranteed to detect any manipulation of the. As wireless sensor networks are usually deployed in. Secure data aggregation in wireless sensor networks. Wireless sensor networks often consists of a large number of low cost sensor nodes that. Data aggregation and gathering transmission in wireless sensor. Secure and highlyavailable aggregation queries in large. When securing such a network, it is important that we minimize the number of computationally expensive security operations without compromising on the security. Energyefficient routing and secure communication in. An onsite aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the offsite querier, thus reducing the communication cost of the query.

Abstractwireless sensor networks wsns rely on innetwork aggregation for ef. We propose security goals for routing in sensor networks, show how attacks against adhoc and peertopeer networks can be adapted into powerful attacks against sensor networks, introduce two. In wireless sensor network, serious security threat is originated by passive attacks in clusterbased data aggregation, which makes a high risk of data confidentiality and data. Abstract secure hierarchical innetwork aggregation in. Secure data aggregation in wireless sensor network.

An approach for data aggregation strategy in wireless sensor. In contrast, the standard threat model in sensor network security assumes that an attacker may control a fraction of. Index termsdata aggregation, hierarchical aggregation. Routing and secure communication in wireless sensor networks by mian ahmad jan and that in their opinion it is fully adequate, in scope and in quality, as a thesis for the degree of doctor of philosophy. The secure data aggregation techniques in wireless sensor networks are also discussed. However, the attacker controlling the compromised sensors can. At first the network was divided into clusters, each cluster begins with an. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal.

Secure data aggregation in wireless sensor networks gmu cs. Secure hierarchical in network aggregation for sensor networks haowen chan, adrian perrig, dawn song. Secure hierarchical innetwork aggregation in sensor. Secure and energyefficient data aggregation in wireless. Secure data aggregation in wireless sensor networks ieee 2012.

Provably secure framework for information aggregation in. Tag is an innetwork aggregation service for tinyos motes that supports a sqllike language for expressing aggregation queries over streaming sensor data 14. An effective and secure data aggregation technique for. Hierarchical concealed data aggregation for wireless. The distributed sensor nodes communicate wirelessly to a central gateway, which provides a connection to the wired world where you can collect, process, analyze, and present your measurement data. Pdf secure data aggregation in wireless sensor networks. In the following section we survey the literature on secure data aggregation schemes and compare this work with others. Optimized secure data aggregation in wireless sensor. A secure data aggregation approach in hierarchical wireless. In this paper, we propose a novel framework for secure information aggregation in large sensor networks. We propose security goals for routing in sensor networks, show how attacks against adhoc and peertopeer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and hello. A corrupted sensor has access to the intermediate data. Wireless sensor networks, leach protocol, secure data aggregation, security keys establishment, attacks 1.

Abstract secure hierarchical innetwork aggregation in sensor. Recent advances in wireless sensor networks wsns have led to many new. As a result, any single dead sensor, destroyed sensor, radiojammed sensor, or compromised sensor can. Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network. Traditional endtoend security is not suitable for use with in network aggregation.

Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In the recent years, secure hierarchical data aggregation in wsn security has been able to attract the attention of a number of researchers around the world. Secure hierarchical innetwork aggregation for sensor networks haowen chan, adrian perrig, dawn song. The proposed methodology deals with mac authentication scheme for secure data aggregation that helps to achieve efficient secure data integrity and privacy with the improvement of energy efficiency and security. However, most aggregation algorithms assume that all intermediate nodes are trusted. Analysis of secure routing protocols based on fundamental aspect a survey on secure hierarchical routing protocols in wireless sensor networks security and energy considerations for routing in hierarchical optical sensor networks unomandili okorafor, kyle. Networks of this approach is innetwork data aggregation. In proceedings of the acm conference on computer and communications security ccs 2006. We present the first algorithm for provably secure hierarchical in network. In section 4 we revise the secure hierarchical data aggregation algorithm as introduced in 1.

339 1051 153 973 1496 1181 1399 1345 332 334 824 930 1446 1263 109 35 756 413 21 699 1100 1324 628 1186 1427 566 1001 473 621 216 1410 524 1021 1310 464 576 579 610 217 836 298