Reactive and adaptive monitoring to secure aggregation in wireless sensor networks

被引:10
|
作者
Labraoui, Nabila [1 ]
Gueroui, Mourad [2 ]
Aliouat, Makhlouf [3 ]
Petit, Jonathan [4 ]
机构
[1] STIC Univ Tlemcen, Tilimsen, Algeria
[2] PRISM Univ Versailles, Versailles, France
[3] Univ Setif, Setif, Algeria
[4] Univ Twente, Disparaitre & Embedded Secur Grp, NL-7500 AE Enschede, Netherlands
关键词
Data aggregation; Hierarchical monitoring mechanism; Wireless sensor networks; Security;
D O I
10.1007/s11235-013-9712-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Data aggregation is considered as one of the fundamental distributed data processing procedures for saving the energy and minimizing the medium access layer contention in wireless sensor networks. However, sensor networks are likely to be deployed in an untrusted environment, which make them vulnerable against several attacks. A compromised node may forge arbitrary aggregation value and mislead the base station into trusting a false reading. Secure in-network aggregation can detect such manipulation. But, as long as such subversive activity is, reliable aggregation result can not be obtained. In contrast, the collection of individual sensor node values is robust and solves the problem of availability, but in an inefficient way. Our work seeks to bridge this gap in secure data collection. We propose a framework that enhances availability with efficiency close to that of in-network aggregation avoiding over-reliance on sensors. To achieve this, we design a scheme that is built on one core concept: no trust is supposed in any sensor. Therefore, we design a two hierarchical levels of monitoring to ensure the integrity and the accuracy of aggregate result, only when necessary, i.e. only when malicious activities are detected. Relying on this new type of monitoring mechanism, the framework has the ability to recover from aggregator failure without neglecting energy efficiency, providing thus much higher availability than other security protocols.
引用
下载
收藏
页码:3 / 17
页数:15
相关论文
共 50 条
  • [31] Secure Cluster based Data Aggregation in Wireless Sensor Networks
    Ranjani, S. Siva
    Radhakrishnan, S.
    Thangaraj, C.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [32] Secure Data Aggregation Scheme in Wireless Sensor Networks for IoT
    Alghamdi, Ahmed
    Alshamrani, Mesfar
    Alqahtani, Abdullah
    Al Ghamdi, Sultan Safar A.
    Harrathi, Rami
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [33] Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review
    D. Vinodha
    E. A. Mary Anita
    Archives of Computational Methods in Engineering, 2019, 26 : 1007 - 1027
  • [34] Secure encrypted-data aggregation for wireless sensor networks
    Huang, Shih-I
    Shieh, Shiuhpyng
    Tygar, J. D.
    WIRELESS NETWORKS, 2010, 16 (04) : 915 - 927
  • [35] Secure Data Aggregation and Intrusion Detection in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2015, : 127 - 131
  • [36] Secure data aggregation in wireless sensor networks: A comprehensive overview
    Ozdemir, Suat
    Xiao, Yang
    COMPUTER NETWORKS, 2009, 53 (12) : 2022 - 2037
  • [37] Secure encrypted-data aggregation for wireless sensor networks
    Shih-I Huang
    Shiuhpyng Shieh
    J. D. Tygar
    Wireless Networks, 2010, 16 : 915 - 927
  • [38] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [39] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [40] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52