Two Security Layers for Hierarchical Data Aggregation in Sensor Networks
نویسندگان
چکیده
Due to resource restricted sensor nodes, it is important to minimize the amount of data transmission among sensor networks so that the average network lifetime and the overall bandwidth utilization are improved. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. It means computing and transmitting partially aggregated data to the end user rather than transmitting raw data in networks while optimizing the energy consumption. However, as sensor networks are often deployed in public or otherwise untrusted and even hostile environments, sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and authentication. Hence, an end-to-end secure aggregation approach is required to ensure a healthy data reception. In this paper, we propose two layers for secure data aggregation in sensor networks. Firstly, we provide an end-to-end encryption scheme that supports operations over cypher-text. It is based on elliptic curve cryptography that exploits a smaller key size, allows the use of higher number of operations on cypher-texts, and prevents the distinction between two identical texts from their cryptograms. We proved that our method outperforms existing ones by providing higher security levels with less energy consumption. Secondly, we propose a new watermarking-based authentication that enables sensor nodes to ensure the identity of other nodes they are communicating with. Our experiments show that our hybrid approach of secure data aggregation enhances the security, significantly reduces computation and communication overhead, and can be practically implemented in on-the-shelf sensor platforms.
منابع مشابه
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملAn Ultra Hierarchical Clustering-Based Secure Aggregation Protocol for Wireless Sensor Networks
In wireless sensor networks (WSNs), security and economy of total energy are two important and necessary aspects to consider. On the one hand, security helps to ensure that such a network is not subject to attacks that involve reading, modification or destruction of information. On the other hand, aggregation of data allows sensors to work together to combine messages to transmit, and in this w...
متن کاملEnergy Efficient Secure Data Aggregation in Wireless Sensor Networks
Secure data aggregation in wireless sensor networks has two main objectives which are contrasting in nature. i) Efficiently collecting and aggregating data ii) Aggregating the data securely. Many schemes do not take into account the passive adversary and allow the aggregator to decrypt data which certainly is not secure; on the other hand using public key cryptography for end to end security is...
متن کاملEffective Data Aggregation Scheme for Large-scale Wireless Sensor Networks
Energy preservation is one of the most important challenges in wireless sensor networks. In most applications, sensor networks consist of hundreds or thousands nodes that are dispersed in a wide field. Hierarchical architectures and data aggregation methods are increasingly gaining more popularity in such large-scale networks. In this paper, we propose a novel adaptive Energy-Efficient Multi-la...
متن کاملSecuring Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
Serious security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJAACS
دوره 7 شماره
صفحات -
تاریخ انتشار 2014