A novel secure data aggregation protocol is proposed to prevent. Secure data aggregation scheme for clustered wireless sensor. However, while this continuous data aggregation operation improves the bandwidth and energy utilization, it may negatively affect other performance. Security data aggregation in wireless sensor networks, emerging communications for wireless sensor networks, anna foerster and alexander foerster, intechopen, doi. Data aggregation is way of summarizing and combining sensor data. Most of the applications of wireless sensor networks have critical tasks to be fulfilled. Secure data aggregation model sdam in wireless sensor networks. In a bid to reduce the power consumption during data gathering, cluster heads are elected to gather data from every node in the wsn.
Secure data aggregation in wireless sensor networks mathunipd. Threats and solutions targets advancedlevel students and researchers in computer science and electrical engineering as a secondary text book. Secure data aggregation technique for wireless sensor. Introduction wireless sensor nodes that collaborate to form a wireless sensor networks wsns, suffer from severe constraints in power, computational resources, memory and bandwidth 1. Compared to general data aggregation problem which is a well researched topic in wireless sensor networks, secure data aggregation problem still has the potential to provide. In this paper, we make the synopsis diffusion approach secure against the above. Sengottuvelan secure data aggregation technique in wireless sensor network in ijircce oct2015 4 vimal kamal and sanjay madria secure data aggregation in wireless sensor. There are basically two types of secure data aggregation protocols 3 based on the topology used for aggregation.
Review for secure data aggregation in wireless sensor. Early secure data aggregation schemes were hop by hop schemes, these schemes like. Secure innetwork aggregation in wireless sensor networks. A secure routing protocol for wireless sensor networks. Secure data aggregation technique in wireless sensor. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks mohsen rezvani, student member, ieee, aleksandar ignjatovic, elisa bertino, fellow, ieee, and sanjay jha, senior member, ieee abstractdue to limited computational power and energy resources, aggregation of data from multiple sensor nodes done. In our design, the encrypted sensor readings were transmitted to the cluster head with mac and the cluster. Professionals working in the wireless sensor networks field will also find this book.
Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network. We propose secure data aggregation for coexisting queries sdacq in wireless sensor networks that allows parallel coexisting aggregate queries from the sink to be disseminated in an authenticated. Wireless sensor networks are now in widespread use to monitor regions, detect events. There has been many related work proposed to address these security issues. In many sensor applications, the data collected from individual nodes. Innetwork aggregation is a natural approach in wireless sensor networks wsns to collaboratively process data. For the readings have the same value and come from different nodes, the cluster head remains the nodes identifiers in data. Secure data aggregation in wireless sensor networks sanjeev setiaa,sankardas roy band sushil jajodia a computer science department, george mason university, fairfax, va, usa b center for secure information systems, george mason university abstract. Reputationbased secure data aggregation in wireless sensor. There are some welldesigned secure data aggregation schemes, which understandably have different tradeoffs and are suitable for particular operations. Proceedings of the seventh acm international symposium on mobile ad hoc networking and computing mobihoc 06, pp. Secure data aggregation in wireless sensor networks article pdf available in ieee transactions on information forensics and security 73. It identifies a security vulnerability in the cpda. Energyefficient and secure patternbased data aggregation protocol 6 in espda, author proposed a protocol to provide energyefficient data aggregation together with secure data communication in wireless sensor networks.
Professionals working in the wireless sensor networks field will also find this book useful as a reference. There are various challenges that are involved in the process of data aggregation like checking of duplication of data after encryption. Secure data aggregation protocols in wireless sensor. We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including nobel prize winners and some of the worlds mostcited researchers. Optimized secure data aggregation in wireless sensor networks.
Elliptic curve cryptography, in network processing, privacy homomorphism, secure data aggregation, wireless sensor networks wsns. Early secure data aggregation schemes were hop by hop schemes, these schemes like the one by hu and evans 8 mostly dealt with the issue of data confidentiality in the face of a single. Secure data aggregation research for wireless sensor network. Secure data aggregation in wireless sensor networks. Providing security to aggregate data in wireless sensor networks is known as secure data aggregation in wsn. Credible secure data aggregation in wireless sensor networks. May 22, 2009 yang y, wang x, zhu s, cao g 2006 sdap.
Proceedings of the seventh acm international symposium on mobile. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks mohsen rezvani, student member, ieee, aleksandar ignjatovic, elisa bertino, fellow, ieee, and sanjay. Data aggregation is the process of data summarizing that has the. Wireless sensor networks wsns, which can have hundreds or thousands of sensor nodes deployed over a monitored region, are being increasingly used in several applications such as military. Secure data aggregation with fully homomorphic encryption in. Secure and privacypreserving data aggregation protocols. Secure tree construction for the secure hopbyhop data aggregation protocol for wireless sensor networks. Proceedings of the 9th asia pacific international conference on information science and technology apicist 2014. On data aggregation with secure bloom filter in wireless. Recently, a few novel protocols have been proposed for. This chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks wsn. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks mohsen rezvani 1aleksandar ignjatovic elisa bertino2 sanjay jha 1 university of new south wales.
In the wireless sensor networkwsn have the hard mission, it prolongs the lifetime of the network, so with the help. In this paper, we propose a secure data aggregation protocol which. Introduction wireless sensor nodes that collaborate. Based on our survey of existing research efforts for ensuring secure data aggregation, a novel approach that uses homomorphic encryption and message. The goal of eeha is that the sensor network can obtain an accurate. Secure data aggregation in wireless sensor networks abstract. It presents a comprehensive state of the art discussion on the various privacy protection mechanisms used in wsns and particularly focuses on the cpda protocols proposed by he et al. Advances in intelligent systems and computing, vol 324. Security data aggregation in wireless sensor networks. The university of texas at arlington, 2008 supervising professor. Reputationbased secure data aggregation in wireless sensor networks. This paper investigates the relationship between security and data aggregation. Joseph, jathin jos a secure edtm for wireless sensor network in ijser feb2016. Data aggregation in wireless sensor networks jin cui to cite this version.
Data aggregation da is the best approach for energy conservation in wireless sensor networks wsn, due to the open deployment, sensors are prone for security threats s. A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. Secure in network aggregation in wireless sensor networks. Secure encrypteddata aggregation for wireless sensor networks. Review for secure data aggregation in wireless sensor networks. In network aggregation is a natural approach in wireless sensor networks wsns to collaboratively process data generated by the sensor nodes.
Mar 06, 2012 this chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks wsn. Data aggregation is a widely used technique in wirelss sensor networks. Secure data aggregation protocols in wireless sensor networks. In this paper, we propose a novel solution for the secure aggregation of data in wsns based on probabilistic homomorphic encryption. Survey on several secure data aggregation schemes in wsn. Reputationbased secure data aggregation in wireless. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with. Our design for data aggregation eliminates redundant sensor. This paper proposes a secure data aggregation scheme for clustered wireless sensor networks.
Sdam aiming at assuring a secure aggregate communication at a low cost in terms of resources. Secure data aggregation in wireless sensor network. A novel secure data aggregation protocol is proposed to prevent the redundant data transmission from sensor nodes to clusterheads. Proceedings of the sixth australasian information security conference aisc 2008.
This dissertation addresses the security issues in wireless sensor networks, focusing on secure data aggregation and false data detection. Energyefficient and highaccuracy secure data aggregation in. Two main security challenges in secure data aggregation are confidentiality and integrity of data. In particular, we present a novel lightweight ver ification algorithm by which the base station can determine if the computed aggregate predicate count or sum. Sengottuvelan secure data aggregation technique in wireless sensor network in ijircce oct2015 4 vimal kamal and sanjay madria secure data aggregation in wireless sensor network 5 nefilda k. Secure data aggregation in wireless sensor networks ieee xplore. As wireless sensor networks are usually deployed in remote and hostile environments to transmit sensitive information, sensor nodes are prone to node compromise attacks and security issues such as data. In wireless sensor networks, the benefit of data aggregation increases if the intermediate sensor nodes perform data aggregation incrementally when data are being forwarded to the base station. Data aggregation is a widely used technique in wireless sensor networks to reduce the power consumed in wsn. Jan 08, 2016 secure data aggregation technique for wireless sensor networks in the presence of collusion attacks to get this project in online or through training sessions contact. Secure data aggregation in wireless sensor networks has two contrasting objectives, i efficiently collecting and aggregating data and ii aggregating the data securely. Secure data aggregation in wireless sensor networks springerlink. Secure data aggregation in wireless sensor networks sanjeev setiaa,sankardas roy band sushil jajodia a computer science department, george mason university, fairfax, va, usa b center for. With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all.
Secure data aggregation in wireless sensor networks wei zhang, ph. Informatics and telecommunications engineering book series lnicst, volume 49. Wireless sensor networks wsns are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. Secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, innetwork data aggregation significantly reduces the amount of communication and energy. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks to get this project in online or through training sessions contact. Pdf secure data aggregation in wireless sensor networks.
In a large sensor network, in network data aggregation significantly reduces the amount of communication and energy consumption. We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including nobel prize winners and some of the worlds mostcited. First is treebased data aggregation protocols in which the intermediate parent nodes in the path from leaf to base station. Secure wireless sensor networks threats and solutions. Therefore, the design of an efficient data aggregation protocol is an inherently challenging task because the protocol designer must trade off.
Secure and privacypreserving data aggregation protocols for. We propose an energyefficient and highaccuracy eeha scheme for secure data aggregation in wireless sensor networks. Privacy preserving secure data aggregation for wireless. While increasing network lifetime, data aggregation protocols may degrade important quality of service metrics in wireless sensor networks, such as data accuracy, latency, faulttolerance, and security. Secure data aggregation technique in wireless sensor network. Energyefficient and secure patternbased data aggregation protocol 6 in espda, author proposed a protocol to provide energyefficient data aggregation together with secure data. Secure encrypteddata aggregation for wireless sensor networks shihi huang. Elliptic curve cryptography, innetwork processing, privacy homomorphism, secure data aggregation, wireless sensor networks wsns. Secure data aggregation in wireless sensor networks ieee 2012. Part of the studies in computational intelligence book series sci, volume 278. In our design, the encrypted sensor readings were transmitted to the cluster head with mac and the cluster head process the encrypted data aggregation without decryption. Secure data aggregation in wireless sensor networks ieee. Secure wireless sensor networks springer for research. The goal of eeha is that the sensor network can obtain an accurate aggregation result while guaranteeing that no private sensor reading is released to other sensors and that no significant extra overhead is introduced.
1397 1364 413 1163 411 187 482 218 316 402 100 1129 651 247 672 303 383 1173 25 763 507 648 820 1600 1102 36 387 421 285 738 1016 1463 17 699