SIA: Secure information aggregation in sensor networks

被引:42
|
作者
Chan, Haowen [1 ]
Perrig, Adrian [1 ]
Przydatek, Bartosz [1 ,2 ]
Song, Dawn [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] ETH, Zurich, Switzerland
关键词
Sensor networks; information aggregation; security; approximate interactive proofs;
D O I
10.3233/JCS-2007-15104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication cost of the query. Since the aggregator is on-site, it is vulnerable to physical compromise attacks. A compromised aggregator may report false aggregation results. Hence, it is essential that techniques are available to allow the querier to verify the integrity of the result returned by the aggregator node We propose a novel framework for secure information aggregation in sensor networks. By constructing efficient random sampling mechanisms and interactive proofs, we enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregator and a fraction of the sensor nodes are corrupted. In particular, we present efficient protocols for secure computation of the median and average of the measurements, for the estimation of the network size, for finding the minimum and maximum sensor reading, and for random sampling and leader election. Our protocols require only sublinear communication between the aggregator and the user
引用
收藏
页码:69 / 102
页数:34
相关论文
共 50 条
  • [31] Secure Data Aggregation with Fault Tolerance for Wireless Sensor Networks
    Annapurna, H. S.
    Siddappa, M.
    2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 29 - 33
  • [32] Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review
    Vinodha, D.
    Anita, E. A. Mary
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2019, 26 (04) : 1007 - 1027
  • [33] A Secure Expansive Aggregation in Wireless Sensor Networks for Linear Infrasturcture
    Shah, Kaushal
    Jinwala, Devesh C.
    2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 207 - 212
  • [34] Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks
    Frej, Mohamed Ben Haj
    Elleithy, Khaled
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 330 - 334
  • [35] Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
    Nabila Labraoui
    Mourad Gueroui
    Makhlouf Aliouat
    Jonathan Petit
    Telecommunication Systems, 2013, 54 : 3 - 17
  • [36] Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
    Labraoui, Nabila
    Gueroui, Mourad
    Aliouat, Makhlouf
    Petit, Jonathan
    TELECOMMUNICATION SYSTEMS, 2013, 54 (01) : 3 - 17
  • [37] Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
    Su, Tung-Shih
    Huang, Mei-Wen
    Li, Wei-Shou
    Hsieh, Wen-Shyong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [38] Secure and efficient verification for data aggregation in wireless sensor networks
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [39] SecureDAV: A secure data aggregation and verification protocol for sensor networks
    Mahimkar, A
    Rappaport, TS
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2175 - 2179
  • [40] SADA : Secure Approximate Data Aggregation in Wireless Sensor Networks
    Prathima, G. E.
    Prakash, Shiva T.
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON DATA SCIENCE & ENGINEERING (ICDSE), 2016, : 46 - 51