Reactive and adaptive monitoring to secure aggregation in wireless sensor networks

被引:11
|
作者
Labraoui, Nabila [1 ]
Gueroui, Mourad [2 ]
Aliouat, Makhlouf [3 ]
Petit, Jonathan [4 ]
机构
[1] STIC Univ Tlemcen, Tilimsen, Algeria
[2] PRISM Univ Versailles, Versailles, France
[3] Univ Setif, Setif, Algeria
[4] Univ Twente, Disparaitre & Embedded Secur Grp, NL-7500 AE Enschede, Netherlands
关键词
Data aggregation; Hierarchical monitoring mechanism; Wireless sensor networks; Security;
D O I
10.1007/s11235-013-9712-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Data aggregation is considered as one of the fundamental distributed data processing procedures for saving the energy and minimizing the medium access layer contention in wireless sensor networks. However, sensor networks are likely to be deployed in an untrusted environment, which make them vulnerable against several attacks. A compromised node may forge arbitrary aggregation value and mislead the base station into trusting a false reading. Secure in-network aggregation can detect such manipulation. But, as long as such subversive activity is, reliable aggregation result can not be obtained. In contrast, the collection of individual sensor node values is robust and solves the problem of availability, but in an inefficient way. Our work seeks to bridge this gap in secure data collection. We propose a framework that enhances availability with efficiency close to that of in-network aggregation avoiding over-reliance on sensors. To achieve this, we design a scheme that is built on one core concept: no trust is supposed in any sensor. Therefore, we design a two hierarchical levels of monitoring to ensure the integrity and the accuracy of aggregate result, only when necessary, i.e. only when malicious activities are detected. Relying on this new type of monitoring mechanism, the framework has the ability to recover from aggregator failure without neglecting energy efficiency, providing thus much higher availability than other security protocols.
引用
收藏
页码:3 / 17
页数:15
相关论文
共 50 条
  • [21] Distributed Monitoring and Aggregation in Wireless Sensor Networks
    Liu, Changlei
    Cao, Guohong
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [22] A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    SENSORS, 2015, 15 (07) : 15127 - 15158
  • [23] A Secure Expansive Aggregation in Wireless Sensor Networks for Linear Infrasturcture
    Shah, Kaushal
    Jinwala, Devesh C.
    2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 207 - 212
  • [24] Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks
    Frej, Mohamed Ben Haj
    Elleithy, Khaled
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 330 - 334
  • [25] A Byzantine Resilient Secure Aggregation Protocol for Wireless Sensor Networks
    Zhang, Zhi
    Cui, Guohua
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4060 - 4063
  • [26] Secure Data Aggregation with Fault Tolerance for Wireless Sensor Networks
    Annapurna, H. S.
    Siddappa, M.
    2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 29 - 33
  • [27] Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review
    Vinodha, D.
    Anita, E. A. Mary
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2019, 26 (04) : 1007 - 1027
  • [28] Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
    Su, Tung-Shih
    Huang, Mei-Wen
    Li, Wei-Shou
    Hsieh, Wen-Shyong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [29] Secure and efficient verification for data aggregation in wireless sensor networks
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [30] SADA : Secure Approximate Data Aggregation in Wireless Sensor Networks
    Prathima, G. E.
    Prakash, Shiva T.
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON DATA SCIENCE & ENGINEERING (ICDSE), 2016, : 46 - 51