SDAP: A secure Hop-by-hop Data Aggregation Protocol for sensor networks

被引:75
|
作者
Yang, Yi [1 ]
Wang, Xinran [1 ]
Zhu, Sencun [1 ]
Cao, Guohong [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
security; algorithm; design; data aggregation; probabilistic grouping; commit-and-attest; hop-by-hop; sensor network security;
D O I
10.1145/1380564.1380568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a sensor network. However, because individual sensor readings are lost in the per-hop aggregation process, compromised nodes in the network may forge false values as the aggregation results of other nodes, tricking the base station into accepting spurious aggregation results. Here a fundamental challenge is how can the base station obtain a good approximation of the fusion result when a fraction of sensor nodes are compromised? To answer this challenge, we propose SDAP, a Secure Hop-by-hop Data Aggregation Protocol for sensor networks. SDAP is a general-purpose secure data aggregation protocol applicable to multiple aggregation functions. The design of SDAP is based on the principles of divide-and-conquer and commit-and-attest. First, SDAP uses a novel probabilistic grouping technique to dynamically partition the nodes in a tree topology into multiple logical groups (subtrees) of similar sizes. A commitment-based hop-by-hop aggregation is performed in each group to generate a group aggregate. The base station then identifies the suspicious groups based on the set of group aggregates. Finally, each group under suspect participates in an attestation process to prove the correctness of its group aggregate. The aggregate by the base station is calculated over all the group aggregates that are either normal or have passed the attestation procedure. Extensive analysis and simulations show that SDAP can achieve the level of efficiency close to an ordinary hop-by-hop aggregation protocol while providing high assurance on the trustworthiness of the aggregation result. Last, prototype implementation on top of TinyOS shows that our scheme is practical on current generation sensor nodes such as Mica2 motes.
引用
下载
收藏
页数:43
相关论文
共 50 条
  • [1] Hop-by-Hop Traceback in Wireless Sensor Networks
    Siddiqui, Muhammad Shoaib
    Amin, Syed Obaid
    Hong, Choong Seon
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (02) : 242 - 245
  • [2] Hop-by-hop Control for Reliable Data Dissemination in Wireless Sensor Networks
    Park, Hosung
    Kim, Taehee
    Lee, Jeongcheol
    Jin, Min-Sook
    Kim, Sang-Ha
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 317 - 322
  • [3] Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks
    Kumar, B. Anil
    Rao, N. Bhaskara
    Sunitha, M. S.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 785 - 791
  • [4] Hop-by-hop frame aggregation for VoIP on multi-hop wireless networks
    Lee, Kyungsoo
    Yun, Sangki
    Kang, Inhye
    Kim, Hyogon
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 2454 - +
  • [5] Transmission control protocol based on hop-by-hop for satellite networks
    Wang, L., 1600, Editorial Board of Journal on Communications (33):
  • [6] Hop-By-Hop Congestion Control for Named Data Networks
    Mejri, Safa
    Touati, Haifa
    Malouch, Naceur
    Kamoun, Farouk
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 114 - 119
  • [7] A hop-by-hop reliability support scheme for wireless sensor networks
    Lee, H
    Ko, Y
    Lee, D
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 431 - +
  • [8] Upstream Hop-by-Hop Congestion Control in Wireless Sensor Networks
    Wang, Guangxue
    Liu, Kai
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, : 1406 - 1410
  • [9] Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
    Zhu, Sencun
    Setia, Sanjeev
    Jajodia, Sushil
    Ning, Peng
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (03)
  • [10] An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    Zhu, S
    Setia, S
    Jajodia, S
    Ning, P
    2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 259 - 271