Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes

نویسندگان

  • Atsuko Miyaji
  • Kazumasa Omote
چکیده

SUMMARY Wireless Sensor Networks (WSNs) rely on in-network ag-gregation for efficiency, that is, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each node and the base station, including the result-checking phase whose congestion is O(log n) where n is the total number of sensor nodes. In this paper * * , we propose an efficient and optimally secure sensor network aggregation protocol against multiple corrupted nodes by a random-walk adversary. Our protocol achieves one round-trip communication to satisfy optimal security without the result-checking phase, by conducting aggregation along with the verification, based on the idea of TESLA technique. Furthermore, we show that the congestion complexity, communication complexity and computational cost in our protocol are constant, i.e., O(1).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks

In many wireless sensor network applications, the data collection sink (base station) needs to find the aggregated statistics of the network. Readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each n...

متن کامل

Secure data aggregation with multiple encryption March 2006

Data aggregation has been put forward as an essential technique to achieve power efficiency in sensor networks. Data aggregation consists of processing data collected by source nodes at each intermediate node enroute to the sink in order to reduce redundancy and minimize bandwidth usage. The deployment of sensor networks in hostile environments call for security measures such as data encryption...

متن کامل

Secure Data Aggregation with Multiple Encryption

Data aggregation has been put forward as an essential technique to achieve power efficiency in sensor networks. Data aggregation consists of processing data collected by source nodes at each intermediate node enroute to the sink in order to reduce redundancy and minimize bandwidth usage. The deployment of sensor networks in hostile environments call for security measures such as data encryption...

متن کامل

Espda: Energy-efficient and Secure Pattern- Based Data Aggregation for Wireless Sensor Networks

Secure data transmission and data aggregation are critical in designing cluster-based sensor networks. This paper presents an Energy-efficient and Secure Pattern-based Data Aggregation protocol (ESPDA) for wireless sensor networks. ESPDA is energy and bandwidth efficient because cluster-heads prevent the transmission of redundant data from sensor nodes. ESPDA is also secure because it does not ...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 94-D  شماره 

صفحات  -

تاریخ انتشار 2011