DocumentCode :
2204368
Title :
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks
Author :
Zhang, Lei ; Zhang, Honggang ; Conti, Mauro ; Di Pietro, Roberto ; Jajodia, Sushil ; Mancini, Luigi Vincenzo
Author_Institution :
George Mason Univ., Mason, OH, USA
fYear :
2010
fDate :
June 29 2010-July 1 2010
Firstpage :
910
Lastpage :
915
Abstract :
Efficient and privacy-preserving data aggregation in a wireless sensor network (WSN) poses a tremendous challenge: how to cope with sensors compromise-once a sensor is compromised, its crypto material is compromised and so is privacy of aggregate data. To address this challenge, we propose two operationally simple and privacy-preserving protocols: PASKOS (Privacy-preserving based on Anonymously Shared Keys and Omniscient Sink) and PASKIS (Privacy-preserving based on Anonymously Shared Keys and Ignorant Sink). They leverage the idea that each node adds to its private sensed value a keyed value (computed from anonymously shared keys) and only uses the resulting sum in the data aggregation process. Our protocols guarantee that the sink is able to efficiently retrieve the aggregated original data by removing keyed values from the received aggregate while preserving the privacy of the aggregated data. Further, both protocols guarantee a high dataloss resilience-the sink retrieves the aggregate of the sensed values of only those nodes who actually participated in the aggregation process. PASKOS effectively protects the privacy of any node against other nodes, by requiring O(log N) communication cost in the worst case and O(1) on average, and requiring O(1) memory and computation cost. PASKIS can even protect a node´s privacy against a compromised sink, and it is more efficient, requiring only O(1) overhead as for computation, communication, and memory; however, these gains in efficiency are traded-off with a (slightly) decreased level of privacy. Through formal analysis and simulations, we demonstrate the superior performance of our protocols against existing solutions in terms of privacy-preserving effectiveness, efficiency, and accuracy of computed aggregation.
Keywords :
data privacy; routing protocols; wireless sensor networks; PASKIS; PASKOS; anonymously shared keys; formal analysis; ignorant sink; omniscient sink; privacy-preserving data aggregation; privacy-preserving protocols; reverse tree-based key routing; robust data aggregation; wireless sensor networks; Aggregates; Pediatrics; Privacy; Proposals; Protocols; Sensors; Wireless sensor networks; Attack-Resilient; Data Aggregation; Hierarchical Aggregation; Privacy; Sensor Network Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
Conference_Location :
Bradford
Print_ISBN :
978-1-4244-7547-6
Type :
conf
DOI :
10.1109/CIT.2010.169
Filename :
5578465
Link To Document :
بازگشت