In the following section we survey the literature on secure data aggregation schemes and compare this work with others. As a result, any single dead sensor, destroyed sensor, radiojammed sensor, or compromised sensor can. Abstract secure hierarchical innetwork aggregation in sensor. Request pdf secure hierarchical data aggregation in wireless sensor networks. We present the first algorithm for provably secure hierarchical innetwork data aggregation. Secure hierarchical innetwork aggregation in sensor. In contrast, hierarchical aggregation approaches make use of in network. Hierarchical concealed data aggregation for wireless. The proposed methodology deals with mac authentication scheme for secure data aggregation that helps to achieve efficient secure data integrity and privacy with the improvement of energy efficiency and security. Using innetwork data aggregation, sensor data from multiple nodes can be combined before being forwarded to neighboring nodes.
The proposed solutions use of cryptography is kept at a minimum to ensure maximum secure bandwidth. We suggest an energy constrained secure hierarchical data aggregation in wireless sensor networks. Secure data aggregation in wireless sensor networks gmu cs. In a largescale wireless sensor network, a topology is needed to gather statebased data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal. Energy constrained secure hierarchical data aggregation in. At first the network was divided into clusters, each cluster begins with an. Secure continuous aggregation in wireless sensor networks. Secure hierarchical data aggregation in wireless sensor networks general framework priti1, suman2 1deptt. In this paper, we propose a novel framework for secure information aggregation in large sensor networks. Secure hierarchical data aggregation in wireless sensor. In proceedings of the acm conference on computer and communications security ccs 2006. Wireless sensor network could not deploy the hostile and uncontrolled environment. Optimal security is achieved via interactive computation of the. The proposed methodology deals with mac authentication scheme for secure data.
An effective and secure data aggregation technique for. Pdf aggregation scheme with secure hierarchical clustering. Abstractwireless sensor networks wsns rely on innetwork aggregation for ef. Wireless sensor networks, leach protocol, secure data aggregation, security keys establishment, attacks 1. Secure and energyefficient clustering scheme saeecs. Data aggregation and gathering transmission in wireless sensor. An ultra hierarchical clusteringbased secure aggregation protocol for wireless sensor networks sebastien faye, jean frederic myoupo advances in information sciences and service sciencesaiss volume3, number9, october 2011 doi. Haowen chan carnegie mellon school of computer science. Wireless sensor networks, brings out variety of different challenges at energy level, integrity, authentication, communication cost. Innetwork aggregation is an essential primitive for performing queries on sensor network data.
The secure data aggregation techniques in wireless sensor networks are also discussed. The distributed sensor nodes communicate wirelessly to a central gateway, which provides a connection to the wired world where you can collect, process, analyze, and present your measurement data. The proposed solutions use of cryptography is kept at. Wireless sensor networks often consists of a large number of low cost sensor nodes that. In large sensor networks, computing aggregates innetwork, i. Index termsdata aggregation, hierarchical aggregation. In this direction, the secure hierarchical innetwork aggregation shia scheme 2 achieves detection of any manipulation of the innetwork aggregation, without assuming a particular data. Similar to 5 it requires the construction of the aggregation tree structure e. Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network. We propose security goals for routing in sensor networks, show how attacks against adhoc and peertopeer networks can be adapted into powerful attacks against sensor networks, introduce two. In section 4 we revise the secure hierarchical data aggregation algorithm as introduced in 1.
However, the attacker controlling the compromised sensors can. Performance evaluation and analysis secure data aggregation in wireless sensor networks has two contrasting. Based on distance to sensor nodes and its energy level the aggregator detects the node. Secure data aggregation protocol with byzantine robustness. Our algorithm is guaranteed to detect any manipulation of the. However, information aggregation in sensor networks is complicated by the fact that the sensor nodes and aggregators may be compromised. In our framework certain nodes in the sensor network, called aggregators, help aggregating. Secure aggregation techniques several secure aggregation algorithms have been proposed assuming that the bs is the only aggregator node in the network 18, 19, 20. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal. When securing such a network, it is important that we minimize the number of computationally expensive security operations without compromising on the security. Optimized secure data aggregation in wireless sensor. We present and implement the secure data aggregation algorithm on mica2 and telosb sensor network platforms and measure the execution time and energy. Securing node capture attacks for hierarchical data aggregation in.
Secure data aggregation in wireless sensor network. A secure data aggregation approach in hierarchical wireless. Using aggregation in wireless sensor network reduces the overall communication cost. Secure hierarchical innetwork aggregation for sensor networks haowen chan, adrian perrig, dawn song. Background in sensor networks, data aggregation provides energy savings. Secure and highlyavailable aggregation queries in large. Aggregation scheme with secure hierarchical clustering for wireless sensor networks article pdf available in international journal of distributed sensor networks 2012155029 july 2012. Routing and secure communication in wireless sensor networks by mian ahmad jan and that in their opinion it is fully adequate, in scope and in quality, as a thesis for the degree of doctor of philosophy. We present the first algorithm for provably secure hierarchical in network. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation result is corrupted by an attacker. We propose security goals for routing in sensor networks, show how attacks against adhoc and peertopeer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and hello. Secure aggregation with malicious node revocation in. An onsite aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the offsite querier, thus reducing the communication cost of the query. Hierarchical secure data aggregation combine the data from various sources, redirect it with the removal of the redundancy and thereby reducing the number of transmissions and also saves energy.
A new approach to secure data aggregation protocol for wireless sensor network. Secure aggregation with malicious node revocation in sensor. Stinson abstract a sensor network is a network comprised of many small, wireless, resourcelimited nodes that sense. Recently, privacy homomorphism based secure data aggregation schemes have been proposed to achieve seamless integration of data con. However, changes in security are necessary when in network aggregation is applied. Performance analysis of secure hierarchical data aggregation. Due to the broadcast nature of the transmission media they use, sensor networks are vulnerable to various security attacks, such as eavesdropping. The inbuilt redundancy in the raw data gathered from various sensor nodes can be banned by the in network data aggregation. Data aggregation is an approach which supports lifetime of the wireless sensor networks wsns against the limited energy. Wireless sensor networks, secure routing protocols, cluster head purpose the efficient routing of information. Energyefficient routing and secure communication in. Secure and efficient hierarchical data aggregation in wireless sensor networks. Provably secure framework for information aggregation in.
Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. Pdf secure data aggregation in wireless sensor networks. Sep 14, 20 secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, in network data aggregation significantly reduces the amount of communication and energy consumption. We are using an additively digital signature algorithm based on ecdsa to achieve integrity of the aggregate result. Proceedings of the sixth australasian information security conference aisc 2008. Hierarchical secure aggregation 2, 10 assumes that the exact set of livereachablesensors is known. In untrusted environments, sensors may potentially be compromised. The first algorithm for provably secure hierarchical innetwork data aggregation. Analysis of secure routing protocols based on fundamental aspect a survey on secure hierarchical routing protocols in wireless sensor networks security and energy considerations for routing in hierarchical optical sensor networks unomandili okorafor, kyle. Secure data aggregation in wireless sensor networks. Secure and energyefficient data aggregation in wireless. Wireless sensor network, security, hierarchical data aggregation. Hu and evans 14 propose a secure aggregation scheme against one single. A short survey on secure routing protocols in hierarchical.
Tag is an innetwork aggregation service for tinyos motes that supports a sqllike language for expressing aggregation queries over streaming sensor data 14. Secure data aggregation in wireless sensor networks mathunipd. In contrast, the standard threat model in sensor network security assumes that an attacker may control a fraction of the nodes, which may misbehave in an arbitrary byzantine manner. In proceedings of the acm conference on computer and communications security ccs 2006 modeling adoptability of secure bgp protocols haowen chan, debabrata dash, adrian perrig, hui zhang. Optimized secure data aggregation in wireless sensor networks. Abstractin wireless sensor networks, performing data aggregation while preserving data con. Recently, secure innetwork aggregation in wireless sensor networks becomes a challenge issue, there is an extensive research on this area due to the large number of applications where the sensors. A survey on privacy preserving data aggregation protocols for. Hierarchical concealed data aggregation for wireless sensor. A secure data aggregation approach in hierarchical. Secure hierarchical innetwork aggregation in sensor networks.
Efficient and optimally secure innetwork aggregation in. Secure data aggregation in wireless sensor networks ieee 2012. Secure hierarchical data aggregation in wireless sensor networks abstract. But in situations where sensor nodes privacy is nonnegotiable, data aggregation cannot be implemented at the cost of security. The first algorithm for provably secure hierarchical in network data aggregation. As wireless sensor networks are usually deployed in.
Secure hierarchical in network aggregation for sensor networks haowen chan, adrian perrig, dawn song. In the recent years, secure hierarchical data aggregation in wsn security has been able to attract the attention of a number of researchers around the world. However, the previous optimally secure in network aggregation protocols against multiple corrupted nodes require two roundtrip communications between each node and the base station, including the resultchecking phase whose congestion is \\cal o\log n\ where n is the total number of sensor nodes. We present the first algorithm for provably secure hierarchical in network data aggregation. A number of hierarchical secure schemes 911, 14, 16 have been proposed for innetwork aggregation on tree topology, where each node computes an intermediate aggregation result accounting for the sensor readings of nodes in the subtree rooted at it. Index termsbase station, data aggregation, hierarchical ag gregation, in network aggregation, sensor network security, syn opsis diffusion. Energyefficient routing and secure communication in wireless. We provide security analysis of the algorithm in section v. Secure and efficient hierarchical data aggregation in. Optimized security of data aggregation technique using a. In the secure data aggregation techniques, reduction in the energy consumption was not elaborated in detail, since aggregator means of connection to sink was either direct or through other aggregators which need. An approach for data aggregation strategy in wireless. Secure data aggregation in wireless sensor networks ieee.
In contrast, the standard threat model in sensor network security assumes that an attacker may control a fraction of. Recent advances in wireless sensor networks wsns have led to many new. Later research efforts, such as the secure hierarchical in network aggregation shia protocol 3 and its enhanced variation 9, as well as the secoa secure aggregation protocol 19, have started to consider multilevel in network aggregation setting where more than one sensor may be compromised. Later research efforts, such as the secure hierarchical innetwork aggregation shia protocol 3 and its enhanced variation 9, as well as the secoa secure aggregation protocol 19, have. Energy efficient clustering and secure data aggregation in. Resilient aggregation in simple linear sensor networks. A solution for integrity preserving data aggregation in wireless sensor networks.
In sensor networks, data aggregation is a vital primitive enabling efficient data queries. At first the network was divided into clusters, each cluster begins with an aggregator and aggregator was connected to sink. Data aggregation is a technique used to conserve battery power in wireless sensor networks wsn. Secure hierarchical data aggregation is expected to pro duce a vast. We elaborate on data aggregation and security in wireless sensor networks in. Data aggregation in wireless sensor networks jin cui to cite this version. A wireless sensor network wsn is a wireless network consisting of spatially distributed autonomous devices that use. Secure hierarchical data aggregation in wireless sensor networks. However, most aggregation algorithms assume that all intermediate nodes are trusted. An ultra hierarchical clusteringbased secure aggregation. Using aggregation in wireless sensor networks is another way to reduce the overall communication cost.
In wireless sensor network, serious security threat is originated by passive attacks in clusterbased data aggregation, which makes a high risk of data confidentiality and data. Communication in wireless sensor networks uses the majority of a sensors limited energy. Secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, innetwork data aggregation significantly reduces the amount of communication and energy. A corrupted sensor has access to the intermediate data. We elaborate on data aggregation and security in wireless sensor networks in section 3. Recently, privacy homomorphism based secure data aggregation. Secure and energyefficient data aggregation in wireless sensor networks jaydip sen member, acm kolkata, india email. Abstract secure hierarchical innetwork aggregation in.
However, changes in security are necessary when innetwork aggregation is. Traditional endtoend security is not suitable for use with in network aggregation. A number of hierarchical secure schemes 911, 14, 16 have been proposed for innetwork aggregation on tree topology, where each node computes an intermediate aggregation result. An approach used by several data acquisition systems 16,31 for sensor networks is to construct a spanning tree rooted. Secure innetwork aggregation can detect such manipulation 2. Provably secure framework for information aggregation in sensor networks 3 the previous one mainly by a fully distributed resultchecking phase without relying on probabilistic security. Tag is an in network aggregation service for tinyos motes that supports a sqllike language for expressing aggregation queries over streaming sensor data 14. Abstract secure hierarchical innetwork aggregation in sensor networks.
An approach for data aggregation strategy in wireless sensor. However, the previous optimally secure innetwork aggregation protocols against multiple corrupted nodes require two roundtrip communications between each node and the base station, including the. Resilient aggregation in simple linear sensor networks kevin j. Networks of this approach is innetwork data aggregation.