DocumentCode :
108726
Title :
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker´s Impact
Author :
Roy, Sandip ; Conti, Marco ; Setia, Sanjeev ; Jajodia, Sushil
Author_Institution :
Comput. & Inf. Sci. Dept., Kansas State Univ., Manhattan, KS, USA
Volume :
9
Issue :
4
fYear :
2014
fDate :
Apr-14
Firstpage :
681
Lastpage :
694
Abstract :
Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication overhead and energy consumption. The research community proposed a loss-resilient aggregation framework called synopsis diffusion, which uses duplicate-insensitive algorithms on top of multipath routing schemes to accurately compute aggregates (e.g., predicate count or sum). However, this aggregation framework does not address the problem of false subaggregate values contributed by compromised nodes. This attack may cause large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above attack launched by compromised nodes. In particular, we present an algorithm to enable the base station to securely compute predicate count or sum even in the presence of such an attack. Our attack-resilient computation algorithm computes the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy. Extensive analysis and simulation study show that our algorithm outperforms other existing approaches.
Keywords :
telecommunication network routing; telecommunication security; wireless sensor networks; WSN; attackers impact; base station; data aggregation security; energy consumption; fire monitoring; message routing; multipath routing schemes; network data aggregation; perimeter surveillance; root node; synopsis diffusion; urban sensing; volcano monitoring; wireless sensor networks; Aggregates; Algorithm design and analysis; Approximation algorithms; Base stations; Routing; Security; Wireless sensor networks; Data aggregation; attack resilient; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2014.2307197
Filename :
6746043
Link To Document :
بازگشت