Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks (original) (raw)

Secure Data Aggregation in Wireless Sensor Networks

The Security in sensor networks has become most important aspect along with low power as the sensors are unattended so there is more possibility of attack in WSN than usual networks, data aggregation security is an important task as if some false node injects a highly odd value it will affect the whole aggregation process, The paper reviews the need of security for data aggregation and propose an architecture which can eliminate the false values injection as well as provides end to end reliability and data freshness, the architecture is also energy optimized.

Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks

International Journal of Distributed Systems and Technologies, 2014

Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is...

SDA-SM: An Efficient Secure Data Aggregation Scheme using Separate MAC across Wireless Sensor Networks

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2021

Securing the aggregated data of the wireless sensor networks (WSNs) is a vital issue to minimize energy consumption and face potential attacks. This paper presents a novel end to end encryption scheme defined as Aggregating Secure Data -Separate MAC (SDA-SM). The importance of the SDA-SM is twofold. First, it separates the secured aggregated data and the message authentication codes (MAC) into two different packets. Second, it transmits these packets in a random separate time-slot according to the scheduling of the TDMA. Moreover, the TDMA applied in the LEACH protocol is modified to adequate to the proposed SDA-SM scheme. The SDA-SM uses MACs to verify the integrity of the aggregated data and uses a sensor protected identifier to authenticate the source of data. The simulation results of the experiments assure the SDA-SM objectives can be achieved with less computation of the communication overheads than earlier techniques. Besides, SDA-SM will be able to accomplish the integrity a...

A taxonomy of secure data aggregation in wireless sensor networks

International Journal of Communication Networks and Distributed Systems, 2012

Recent advances in wireless sensor networks (WSNs) have led to several new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the entire energy consumption of the WSNs. Consequently, data aggregation techniques can significantly help to reduce the energy consumption by eliminating redundant data travelling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in WSNs. With this in mind, the security issues in data aggregation for the WSN will be discussed in this article. After that, the 'state-of-the-art' in secure data aggregation schemes will be surveyed and then classified into two categories based on the number of aggregator nodes and the existence of the verification phase.

SDAF: A Secure Data Aggregation Framework for Wireless Sensor Networks

International Journal of Computer and Electrical Engineering, 2013

Wireless sensor networks (WSNs) are constrained in terms of memory, computation, communication, and energy. To reduce communication overhead and energy expenditure in (WSNs), data aggregation is used. Data aggregation is a very important technique, but it gives extra opportunity to the adversary to attack the network, inject false messages into the network and trick the base station to accept false aggregation results. This paper presents a secure data aggregation framework (SDAF) for (WSNs). The goal of the framework is to ensure data integrity and data confidentiality. SDAF uses two types of keys. Base station shares a unique key with each sensor node that is used for integrity and the aggregator shares a unique key with each sensor node (within that cluster) that is used for data confidentiality. Sensor nodes calculate a message authentication code (MAC) of the sensed data using shared key with base station, which verifies the MAC for message integrity. Sensor nodes encrypt the sensed data using shared key with aggregator, which ensures data confidentiality. Proposed framework has low communication overhead as the redundant packets are dropped at the aggregators.

A test-bed for secure hierarchical data aggregation in wireless sensor networks

The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), 2010

Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). When securing such a network, it is important that we minimize the number of computationally expensive security operations without compromising on the security. This paper deals with the test-bed implementation of our end to end secure data aggregation algorithm. Unlike previous algorithms which required separate phases for secure aggregation and integrity verification, ours does not require an additional phase for verification. This saves energy by avoiding additional transmissions and computation overhead on the sensor nodes. We have implemented our secure data aggregation algorithms on mica2 motes. I.

A Novel Approach for Secure Data Aggregation in Wireless Sensor Networks

The Wireless Sensor Networks (WSNs) are composed of resource starved sensor nodes that are deployed to sense, process and communicate vital information to the base station. Due to the stringent constraints on the resources in the sensor nodes on one hand and due to the communications costs being always significantly higher than the data processing costs, the WSNs typically, employ in-network processing, which aims at reducing effectively, the total number of packets eventually transmitted to the base station. Such innetwork processing largely employs data aggregation operations that aggregate the data into a compact representation for further transmission. However, due to the ubiquitous & pervasive deployment, heavier resource demands of the security protocols and due to the stringent resource constraints in WSN nodes, the security concerns in WSNs are even otherwise critical. These concerns assume alarming proportions when using data aggregation in which the output of the data aggr...

Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013

Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. Based on our survey of existing research efforts for ensuring secure data aggregation, a novel approach that uses homomorphic encryption and Message Authentication Codes (MAC) to achieve confidentiality, authentication and integrity for secure data aggregation in wireless sensor networks is proposed. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead and can be practically implemented in on-the-shelf sensor platforms.

Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis

Communication in wireless sensor networks uses the majority of a sensor's limited energy. Using aggregation in wireless sensor network reduces the overall communication cost. Security in wireless sensor networks entails many different challenges. Traditional end-to-end security is not suitable for use with in-network aggregation. A corrupted sensor has access to the data and can falsify results. Additively homomorphic encryption allows for aggregation of encrypted values, with the result being the same as the result when unencrypted data was aggregated. Using public key cryptography, digital signatures can be used to achieve integrity. We propose a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in-network aggregation in wireless sensor networks. We prove that our digital signature algorithm which is based on the Elliptic Curve Digital Signature Algorithm (ECDSA) is as secure as ECDSA.

Secure and efficient verification for data aggregation in wireless sensor networks

International Journal of Network Management, 2017

The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the major concerns in WSNs. In order to verify the data, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at sink node, i.e., after reception of aggregate, a detection that is inefficient and leads to a significant loss of legitimate data. In this paper, we propose a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on sink node for verification. Based on an enhanced version of TinyECC, the solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of the scheme for WSNs. 1 | INTRODUCTION The "Internet of Things (IoT)" is a buzzword and the object of many prospective. IoT is not a futuristic technology trend; it is already in place today in equipment, sensors, and infrastructures. That exciting technologies can be depicted as a collection of smart devices that interact on a collaborative basis to fulfil a common goal. Nowadays considered as one of the main elements in IoT, 1 wireless sensor networks (WSNs) are wireless networks consisting of spatially distributed autonomous devices using sensors to collect surrounding data and environment information. The basic idea of IoT is that every node (i.e., IoT device) is connected to the Internet. However, in IoT context, the WSN can be configured to access the Internet through an Internet powered device (sink node), which gathers readings and sends them to the cloud. See Figure 1. In a nutshell, the sink node manages all interaction between the WSN and the outside world (known as Front-End solution, in which the WSN is completely independent from the Internet). 2 Data aggregation is widely used in most of applications due to its advantage of reducing the communication cost. In data aggregation, the leaves nodes send their data to another node called aggregator, which aggregates them and sends the result to the sink node. This leads to an improvement in terms of bandwidth and energy consumption and, therefore, helps in prolonging the WSN's overall lifetime. 3 However, data aggregation in WSNs is risky. In fact, the data are