Title :
Aggregating secure data in wireless sensor networks
Author :
Parameswari, K. ; Raseen, M. Mohamed
Author_Institution :
Akshaya Coll. of Eng. & Technol., Coimbatore, India
Abstract :
In a large sensor network, in-network data aggregation significantly reduces the amount of communication overhead and energy consumption. Due to less amount of data transmission, so that the average sensor lifetime and the overall bandwidth utilization are improved. As wireless sensor networks are usually deployed in remote and hostile environments to transmit sensitive information. Sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and integrity are extremely important. Recently, A robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., predicate Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false sub aggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. The proposed algorithm is a light weight verification algorithm by which the base station can determine if the computed aggregate (predicate Count and Sum) includes any false contribution. Through theoretical analysis and extensive simulation study, it is shown that the proposed algorithm outperforms other existing approaches.
Keywords :
telecommunication security; wireless sensor networks; aggregation hierarchy; bandwidth utilization; base station; communication overhead; data confidentiality; data transmission; duplicate-insensitive algorithms; energy consumption; false contribution; false sub aggregate values; hostile environment; in-network data aggregation; message losses; multipath routing schemes; node compromise attacks; node failure; remote environment; robust aggregation framework; root node; secure data; security issues; sensor lifetime; sensor nodes; synopsis diffusion; tamper-resistant hardware; transmission failure; wireless sensor networks; Base station; data aggregation; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion;
Conference_Titel :
Current Trends in Engineering and Technology (ICCTET), 2013 International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-2583-4
DOI :
10.1109/ICCTET.2013.6675991