DocumentCode :
1461834
Title :
Secure Data Aggregation in Wireless Sensor Networks
Author :
Roy, Sankardas ; Conti, Mauro ; Setia, Sanjeev ; Jajodia, Sushil
Author_Institution :
Dept. of Syst. & Comput. Sci., Howard Univ., Washington, DC, USA
Volume :
7
Issue :
3
fYear :
2012
fDate :
6/1/2012 12:00:00 AM
Firstpage :
1040
Lastpage :
1052
Abstract :
In a large sensor network, in-network data aggregation significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., predicate Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false subaggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. In this paper, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false subaggregate values. In particular, we present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false contribution. Thorough theoretical analysis and extensive simulation study show that our algorithm outperforms other existing approaches. Irrespective of the network size, the per-node communication overhead in our algorithm is O(1).
Keywords :
formal verification; telecommunication network routing; telecommunication security; wireless sensor networks; aggregation hierarchy; base station; data aggregation security; duplicate-insensitive algorithms; false subaggregate values; in-network data aggregation; multipath routing schemes; robust aggregation framework; synopsis diffusion approach; verification algorithm; wireless sensor networks; Aggregates; Algorithm design and analysis; Base stations; Educational institutions; Protocols; Security; Wireless sensor networks; Base station; data aggregation; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2012.2189568
Filename :
6163407
Link To Document :
بازگشت