• DocumentCode
    74516
  • Title

    Secure Continuous Aggregation in Wireless Sensor Networks

  • Author

    Lei Yu ; Jianzhong Li ; Siyao Cheng ; Shuguang Xiong ; Haiying Shen

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA
  • Volume
    25
  • Issue
    3
  • fYear
    2014
  • fDate
    Mar-14
  • Firstpage
    762
  • Lastpage
    774
  • Abstract
    Continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of aggregates. However, in a hostile environment, the adversary could fabricate false temporal variation patterns of the aggregates by manipulating a series of aggregation results through compromised nodes. Existing secure aggregation schemes conduct one individual verification for each aggregation result, which could incur great accumulative communication cost and negative impact on transmission scheduling for continuous aggregation. In this paper, we identify distinct design issues for protecting continuous in-network aggregation and propose a novel scheme to detect false temporal variation patterns. Compared with the existing schemes, our scheme greatly reduces the verification cost by checking only a small part of aggregation results to verify the correctness of the temporal variation patterns in a time window. A sampling-based approach is used to check the aggregation results, which enables our scheme independent of any particular in-network aggregation protocols as opposed to existing schemes. We also propose a series of security mechanisms to protect the sampling process. Both theoretical analysis and simulations show the effectiveness and efficiency of our scheme.
  • Keywords
    access protocols; scheduling; wireless sensor networks; accumulative communication cost; false temporal variation patterns; hostile environment; in-network aggregation; negative impact; protocols; secure continuous aggregation; security mechanisms; temporal variation information; time window; transmission scheduling; verification cost; wireless sensor networks; Aggregates; Approximation error; Authentication; Base stations; Heuristic algorithms; Wireless sensor networks; Wireless sensor network; network security; sampling; secure continuous aggregation;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2013.63
  • Filename
    6471976