[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1352533.1352546acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

An efficient integrity-preserving scheme for hierarchical sensor aggregation

Published: 31 March 2008 Publication History

Abstract

Sensor networks have proven to be useful in many application domains. Having the sensor nodes aggregate their results inside the network before sending the results to a base station has been shown to increase the lifetime of the network. However, sensor networks that are deployed in hostile environments need aggregation protocols that protect the integrity of the result. Recently, Chan et al. [3] introduced such a scheme that requires O(Δlog2n) communication per node, where Δ$ is the degree of the aggregation tree for the network and n is the number of nodes in the network. In this paper, we introduce modifications of this approach that reduce the maximum communication per node to O(Δlog2n).

References

[1]
H. Çam, S. Özdemir, P. Nair, D. Muthuavinashiappan, and H. Ozgur Sanli. Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications, 29(4):446--455, 2006.
[2]
C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In MOBIQUITOUS '05: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 109--117, Washington, DC, USA, 2005. IEEE Computer Society.
[3]
H. Chan, A. Perrig, and D. Song. Secure hierarchical in-network aggregation in sensor networks. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 278--287, New York, NY, USA, 2006. ACM Press.
[4]
J.-Y. Chen, G. Pandurangan, and D. Xu. Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. In IPSN '05: Proceedings of the 4th international symposium on Information processing in sensor networks, page 46, Piscataway, NJ, USA, 2005. IEEE Press.
[5]
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A witness-based approach for data fusion assurance in wireless sensor networks. In Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE, volume 3, pages 1435--1439, Dec. 2003.
[6]
J. Girao, D. Westhoff, and M. Schneider. CDA: Concealed Data Aggregation in Wireless Sensor Networks. In WiSe '04: Proceedings of the 2004 ACM workshop on Wireless security, New York, NY, USA, 2004. ACM Press.
[7]
I. Gupta, R. van Renesse, and K. P. Birman. Scalable fault-tolerant aggregation in large process groups. In DSN '01: Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), pages 433--442, Washington, DC, USA, 2001. IEEE Computer Society.
[8]
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 2002.
[9]
L. Hu and D. Evans. Secure aggregation for wireless networks. In Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on, pages 384--391, Jan. 2003.
[10]
P. Jadia and A. Mathuria. Efficient secure aggregation in sensor networks. In Proceedings of the 11th International Conference on High Performance Computing. Springer, 2004.
[11]
P. M. M. Garofalakis, J. Hellerstein. Proof sketches: Verifiable in-network aggregation. In Proceedings of the IEEE 23rd International Conference on Data Engineering, 2007.
[12]
S. Madden, M. Franklin, J. Hellerstein, and W. Hong. Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev., 36:131--146, 2002.
[13]
A. Mahimkar and T. S. Rappaport. SecureDAV: a secure data aggregation and verification protocol for sensor networks. In Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, volume 4, pages 2175--2179, Nov./Dec. 2004.
[14]
A. Manjhi, S. Nath, and P. B. Gibbons. Tributaries and deltas: efficient and robust aggregation in sensor network streams. In SIGMOD '05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 287--298, New York, NY, USA, 2005. ACM Press.
[15]
R. C. Merkle. Protocols for public key cryptosystems. In Symposium on Security and Privacy, pages 122--134, 1980.
[16]
S. Nath, P. B. Gibbons, S. Seshan, and Z. R. Anderson. Synopsis diffusion for robust aggregation in sensor networks. In SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 250--262, New York, NY, USA, 2004. ACM Press.
[17]
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor netowrks. Wirel. Netw., 8:521--534, 2002.
[18]
B. Przydatek, D. Song, and A. Perrig. Sia: secure information aggregation in sensor networks. In SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems, pages 255--265, New York, NY, USA, 2003. ACM Press.
[19]
M. Qin and R. Zimmerman. An energy-efficient voting-based clustering algorithm for sensor networks. In SNPD, 2005.
[20]
M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao. Non-manipulable aggregator node election protocols for wireless sensor networks. In 5th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Limassol, Cyprus, Greece, April 2007. WiOpt 2007.
[21]
Y. Yang, X. Wang, S. Zhu, and G. Cao. Sdap:: a secure hop-by-hop data aggregation protocol for sensor networks. In MobiHoc '06: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing, pages 356--367, New York, NY, USA, 2006. ACM Press.
[22]
Y. Yao and J. Gehrke. The cougar approach to in-network query processing in sensor networks. SIGMOD Record, 31:9--18, 2002.

Cited By

View all
  • (2024)Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoTCryptology and Network Security with Machine Learning10.1007/978-981-97-0641-9_50(731-744)Online publication date: 23-Apr-2024
  • (2022)ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architectureJournal of Cloud Computing10.1186/s13677-022-00295-511:1Online publication date: 26-Jul-2022
  • (2021)SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks2021 17th International Conference on Mobility, Sensing and Networking (MSN)10.1109/MSN53354.2021.00074(454-461)Online publication date: Dec-2021
  • Show More Cited By

Index Terms

  1. An efficient integrity-preserving scheme for hierarchical sensor aggregation

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '08: Proceedings of the first ACM conference on Wireless network security
      March 2008
      234 pages
      ISBN:9781595938145
      DOI:10.1145/1352533
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 March 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. integrity
      2. secure aggregation
      3. sensor networks

      Qualifiers

      • Research-article

      Conference

      WISEC '08
      Sponsor:
      WISEC '08: First ACM Conference on Wireless Network Security
      March 31 - April 2, 2008
      VA, Alexandria, USA

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoTCryptology and Network Security with Machine Learning10.1007/978-981-97-0641-9_50(731-744)Online publication date: 23-Apr-2024
      • (2022)ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architectureJournal of Cloud Computing10.1186/s13677-022-00295-511:1Online publication date: 26-Jul-2022
      • (2021)SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks2021 17th International Conference on Mobility, Sensing and Networking (MSN)10.1109/MSN53354.2021.00074(454-461)Online publication date: Dec-2021
      • (2021)Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networksFrontiers of Computer Science10.1007/s11704-021-9460-615:6Online publication date: 3-Aug-2021
      • (2020)Secure In-Network Aggregation in Wireless Sensor NetworksInternational Journal of Intelligent Information Technologies10.4018/IJIIT.202001010416:1(49-74)Online publication date: Jan-2020
      • (2019)Secure Data Aggregation in Wireless Sensor Networks: Enumeration Attack and CountermeasureICC 2019 - 2019 IEEE International Conference on Communications (ICC)10.1109/ICC.2019.8761889(1-7)Online publication date: May-2019
      • (2018)Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)10.1109/ICEECCOT43722.2018.9001390(355-361)Online publication date: Dec-2018
      • (2018)Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4962-098:2(2037-2077)Online publication date: 1-Jan-2018
      • (2018)SCIoT: A Secure and sCalable End-to-End Management Framework for IoT DevicesComputer Security10.1007/978-3-319-99073-6_29(595-617)Online publication date: 8-Aug-2018
      • (2017)SECURE DATA COMMUNICATION IN I-LEACH PROTOCOL IN WIRELESS SENSOR NETWORKSi-manager’s Journal on Wireless Communication Networks10.26634/jwcn.6.1.137706:1(7)Online publication date: 2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media