Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes

被引:0
|
作者
Choi, Sunoh [1 ]
Ghinita, Gabriel [2 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Massachusetts, Dept Comp Sci, Boston, MA USA
关键词
Security; Aggregation; Sensor Networks;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In-network aggregation is an essential operation which reduces communication overhead and power consumption of resource-constrained sensor network nodes. Sensor nodes are typically organized into an aggregation tree, whereby aggregator nodes collect data from multiple data source nodes, and perform a reduction operation such as sum, average, minimum, etc. The result is then forwarded to other aggregators higher in the hierarchy toward a base station (or sink node) that receives the final outcome of the in-network computation. However, despite its performance benefits, aggregation introduces several difficult security challenges with respect to data confidentiality, integrity and authenticity. In today's outsource-centric computing environments, the aggregation task may be delegated to a third party that is not fully trusted. In addition, even in the absence of outsourcing, nodes may be compromised by a malicious adversary with the purpose of altering aggregation results. To defend against such threats, several mechanisms have been proposed, most of which devise aggregation schemes that rely on cryptography to detect that an attack has occurred. Although they prevent the sink from accepting an incorrect result, such techniques are vulnerable to denial-of-service if a compromised node alters the aggregation result in each round. Several more recent approaches also identify the malicious nodes and exclude them from future computation rounds. However, these incur high communication overhead as they require flooding or other expensive communication models to connect individual nodes with the base station. We propose a flexible aggregation structure (FAS) and an advanced ring structure (ARS) topology that allow secure aggregation and efficient identification of malicious aggregator nodes for the SUM operation. Our scheme uses only symmetric key cryptography, outperforms existing solutions in terms of performance, and guarantees that the aggregate result is correct and that malicious nodes are identified.
引用
收藏
页码:19 / 27
页数:9
相关论文
共 50 条
  • [1] General Secure Sensor Aggregation in the Presence of Malicious Nodes
    Frikken, Keith B.
    Kauffman, Kyle
    Steele, Aaron
    IEEE 27TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2011), 2011, : 506 - 516
  • [2] Secure Aggregation with Malicious Node Revocation in Sensor Networks
    Chen, Binbin
    Yu, Haifeng
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 581 - 592
  • [3] Secure Efficient Geocast Protocol for Sensor Networks with Malicious Nodes
    Shim, Young-Chul
    EHAC'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS, 2009, : 179 - 184
  • [4] Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation
    Yessembayev, Anes
    Sarkar, Dilip
    Sikder, Faisal
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (03): : 549 - 563
  • [5] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    Gomathi, S.
    Krishnan, C. Gopala
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 1775 - 1790
  • [6] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    S. Gomathi
    C. Gopala Krishnan
    Wireless Personal Communications, 2020, 113 : 1775 - 1790
  • [7] A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET
    Dhanalakshmi, S.
    Rajaram, M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 184 - 190
  • [8] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [9] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
  • [10] Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    Liu, DG
    Ning, P
    Du, WL
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 609 - 619