Distributed Audit Secure Data Aggregation for Wireless Sensor Networks

被引:0
|
作者
Zhang, Zhengdao [1 ]
Zhou, Zhiping [1 ]
机构
[1] Jiangnan Univ, Engn Res Ctr IOTs Technol & Applicat, Minist Educ, Wuxi, Jiangsu, Peoples R China
关键词
Data aggregation; Distribution; Probabilistic grouping; Watermark; Sensor network security;
D O I
10.1007/978-3-642-38466-0_48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation can reduce the communication overhead and energy expenditure of sensor nodes, as well as extend the life-cycle of the wireless sensor network. However, because individual sensors may be compromised, the data aggregation also introduces some risks including the false data injection attacks. This paper proposes a distributed audit secure data aggregation protocol. The aggregates are audited at the next level nodes of the aggregators. The communication overload, which Base Station (BS) originates in the attest process, can be avoided. Furthermore, because we can find the false data in the lower level, it is easier to strike out the false data, and only a little fraction of readings are dropped off. To do these, the aggregators attach multi-certificates to the aggregates. Those certificates may include the maximum, minimum, mean reads and those nodes' identifiers. To further reduce the communication overload, we use the watermark method to embed the multi-certificates in authentication part of aggregates. The length of message is kept as same as that under the normal hop-by-hop aggregation protocol with MACs. The analysis shows that our protocol is efficient and provides certain assurance on the trustworthiness of the aggregation result.
引用
收藏
页码:431 / 438
页数:8
相关论文
共 50 条
  • [1] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [2] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [3] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [4] Secure and reliable data aggregation for wireless sensor networks
    Ozdemir, Suat
    [J]. UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4836 : 102 - 109
  • [5] Survey on Secure Data Aggregation in Wireless Sensor Networks
    Gaikwad, Priyanka B.
    Dhage, Manisha R.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 242 - 246
  • [6] Secure data aggregation in wireless sensor networks: A survey
    Sang, Yingpeng
    Shen, Hong
    Inoguchi, Yasushi
    Tan, Yasuo
    Xiong, Naixue
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 315 - +
  • [7] Credible Secure Data Aggregation in Wireless Sensor Networks
    Anuradha, M. P.
    Ganapathy, Gopinath
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 395 - 404
  • [8] A taxonomy of secure data aggregation in wireless sensor networks
    Alzaid, Hani
    Foo, Ernest
    Nieto, Juan Manuel Gonzalez
    Park, DongGook
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 8 (1-2) : 101 - 148
  • [9] A secure data aggregation scheme for wireless sensor networks
    Ren, Shu Qin
    Kim, Dong Seong
    Park, Jong Sou
    [J]. FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 32 - +
  • [10] Hybrid Secure Data Aggregation in Wireless Sensor Networks
    Parmar, Keyur
    Jinwala, Devesh C.
    [J]. CYBER PHYSICAL SYSTEMS: DESIGN, MODELING, AND EVALUATION, CYPHY 2015, 2015, 9361 : 116 - 131