Title :
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
Author_Institution :
Nat. Univ. of Singapore, Singapore, Singapore
Abstract :
Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In untrusted environments, sensors may potentially be compromised. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation result is corrupted by an attacker. However, the attacker (controlling the compromised sensors) can keep corrupting the result, rendering the system unavailable. This paper aims to enable aggregation queries to tolerate instead of just detecting the adversary. To this end, we propose a novel tree sampling algorithm that directly uses sampling to answer aggregation queries. It leverages a novel set sampling technique to overcome a key and well-known obstacle in sampling - traditional sampling technique is only effective when the predicate count or sum is large. Set sampling can efficiently sample a set of sensors together, and determine whether any sensor in the set satisfies the predicate (but not how many). With set sampling as a building block, tree sampling can provably generate a correct answer despite adversarial interference, while without the drawbacks of traditional sampling techniques.
Keywords :
query processing; sampling methods; telecommunication security; trees (mathematics); wireless sensor networks; aggregation query answering; large-scale wireless sensor network security; set sampling; tree sampling algorithm; untrusted environment; Aggregates; Base stations; Computer security; Interference; Large-scale systems; Protocols; Sampling methods; Sensor phenomena and characterization; Sensor systems; Wireless sensor networks;
Conference_Titel :
Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4244-5108-1
Electronic_ISBN :
978-1-60558-371-6