Secure Aggregation of Exact Sum Queries with Integrity Protection for Wireless Sensor Networks (original) (raw)

Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks

2014

The Wireless Sensor Networks (WSNs) protocols commonly use innetwork processing to optimize the communication costs. In-network processing involves processing of the sensed data on-the-fly during the course of the communication to the base station. However, due to the fusion of the data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation.One of the approaches to ensure secure data aggregation is to use encrypted sensor data for processing, using homomorphic encryption. Our research here is aimed to propose an approach that uses homomorphic encryption and appropriate data integrity mechanisms to offer confidentiality, privacy and data integrityfor secure data aggregation in wireless sensor networks.

Privacy Preserving Secure Data Aggregation for Wireless Sensor Networks

Journal of Computers

The Wireless Sensor Networks (WSNs) protocols commonly use in-network processing to optimize the communication costs. In-network processing involves processing of the sensed data on-the-fly during the course of the communication to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. There has been numerous proof-of-concept attempts published in the literature, that devise secure data aggregation protocols offering either end-to-end or hop-by-hop secure aggregation. However, as per our modest observations, an integrated framework that offers all the necessary security attributes viz. confidentiality, privacy and integrity for secure data aggregation in WSNs is required. In this paper, we propose a framework for privacy preserving secure data aggregation in WSNs that provides support for confidentiality, privacy and integrity collectively. To support the confidentiality and privacy attributes in the framework, we evaluate the classical homomorphic encryption algorithms by comparative evaluation. Subsequently, based on this elaborate evaluation, we integrate the optimal algorithm amongst these, into tree topology in WSNs. To support the data integrity attribute, we analyse Elliptic Curve Digital Signature Algorithm (EC-DSA) and all of its published variants. However, in order to enhance the security strength of the basic EC-DSA, we propose our own variant of EC-DSA. In our humble observations, ours is a unique attempt that integrates the support for confidentiality, privacy and integrity in defined tree architecture for secure data aggregation protocol. We substantiate the proposal with elaborate experimental evaluation, too.

Secure data aggregation protocol for sensor networks

2015

We propose a secure in-network data aggregation protocol with internal verification, to gain increase in the lifespan of the network by preserving bandwidth. For doing secure internal distributed operations, we show an algorithm for securely computing the sum of sensor readings in the network. Our algorithm can be generalized to any random tree topology and can be applied to any combination of mathematical functions. In addition, we represent an efficient way of doing statistical analysis for the protocol. Furthermore, we propose a novel, distributed and interactive algorithm to trace down the adversary and remove it from the network. Finally, we do bandwidth analysis of the protocol and give the proof for the efficiency of the protocol.

Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks

International Journal of Distributed Systems and Technologies, 2014

Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is...

Secure Data Aggregation in Wireless Sensor Network

— Wireless technology is evolving enormously and WSN have progressive applications in the area of surveillance and monitoring. A WSN is a system of sensor nodes for sensing, grouping and processing information. Data aggregation in WSN is employed to fuse data to form representative of whole data. In-network aggregation is supportive in conserving battery power and reducing communication overhead thus enhancing network lifetime. Tree-based aggregation is susceptible to error when looses sub-tree of readings because of node failure. Synopsis diffusion is a framework that avoids problems of tree based approach by incorporating multi-path routing and also avoids problem of double counting which is moderate in multiple routing. This is done by representing sensed value by a synopsis which is a bit vector of integers as zero or one and any particular reading is counted once. Synopsis diffusion has no stipulation of security and compromised node attack can't be prevented using cryptography when security is such an important aspect in wireless sensor networks. This paper reviews the attack resilient computation algorithm which computes the true aggregate in presence of compromised nodes by filtering their false contributions. In specific concern, the algorithm allows the base station to compute the sum or count unharmed in presence of such an attack.

Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis

Communication in wireless sensor networks uses the majority of a sensor's limited energy. Using aggregation in wireless sensor network reduces the overall communication cost. Security in wireless sensor networks entails many different challenges. Traditional end-to-end security is not suitable for use with in-network aggregation. A corrupted sensor has access to the data and can falsify results. Additively homomorphic encryption allows for aggregation of encrypted values, with the result being the same as the result when unencrypted data was aggregated. Using public key cryptography, digital signatures can be used to achieve integrity. We propose a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in-network aggregation in wireless sensor networks. We prove that our digital signature algorithm which is based on the Elliptic Curve Digital Signature Algorithm (ECDSA) is as secure as ECDSA.

A Novel Approach for Secure Data Aggregation in Wireless Sensor Networks

The Wireless Sensor Networks (WSNs) are composed of resource starved sensor nodes that are deployed to sense, process and communicate vital information to the base station. Due to the stringent constraints on the resources in the sensor nodes on one hand and due to the communications costs being always significantly higher than the data processing costs, the WSNs typically, employ in-network processing, which aims at reducing effectively, the total number of packets eventually transmitted to the base station. Such innetwork processing largely employs data aggregation operations that aggregate the data into a compact representation for further transmission. However, due to the ubiquitous & pervasive deployment, heavier resource demands of the security protocols and due to the stringent resource constraints in WSN nodes, the security concerns in WSNs are even otherwise critical. These concerns assume alarming proportions when using data aggregation in which the output of the data aggr...

Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks

Proceedings of the 2nd IEEE National Conference on Computational Intelligence and Signal Processing (CISP 2012), March 2 – 3, 2012, Guwahati, India, 2012

Data aggregation in intermediate nodes (called aggregator nodes) is an effective approach for optimizing consumption of scarce resources like bandwidth and energy in Wireless Sensor Networks (WSNs). However, in-network processing poses a problem for the privacy of the sensor data since individual data of sensor nodes need to be known to the aggregator node before the aggregation process can be carried out. In applications of WSNs, privacy-preserving data aggregation has become an important requirement due to sensitive nature of the sensor data. Researchers have proposed a number of protocols and schemes for this purpose. He et al. (INFOCOM 2007) have proposed a protocol - called CPDA - for carrying out additive data aggregation in a privacy-preserving manner for application in WSNs. The scheme has been quite popular and well-known. In spite of the popularity of this protocol, it has been found that the protocol is vulnerable to attack and it is also not energy-efficient. In this paper, we first present a brief state of the art survey on the current privacy-preserving data aggregation protocols for WSNS. Then we describe the CPDA protocol and identify its security vulnerability. Finally, we demonstrate how the protocol can be made secure and energy efficient.

Secure Data Aggregation Protocols in Wireless Sensor Networks

International Journal of Engineering and Technology, 2017

Data communication between nodes in Wireless Sensor Networks consumes a large percentage of their total energy. Data Aggregation is one of the major techniques to preserve energy level in such type of networks because it eliminates the transfer of redundant data. But. Because of deployment in remote areas, the sensor nodes are easy target for the intruders to make attacks and gather the sensitive information. Different security goals has to be achieved by a good protocol but unfortunately none is perfect because of some tradeoffs in different security goals and energy consumption. Many secure data aggregation protocols have been proposed in wireless sensor networks which achieve one or the other goals viz Data Availability, Confidentiality, Integrity, Freshness , Authentication, Accuracy. In this paper, many existing secure data aggregation protocols have been analyzed deeply and compared in terms of the security goals they achieve. To the best of our knowledge, no such large number of protocols are compared before.