Secure Continuous Aggregation in Wireless Sensor Networks

被引:6
|
作者
Yu, Lei [1 ]
Li, Jianzhong [2 ]
Cheng, Siyao [2 ]
Xiong, Shuguang [2 ,3 ]
Shen, Haiying [1 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Harbin Inst Technol, Dept Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
[3] Baidu Inc, Beijing, Peoples R China
基金
美国国家科学基金会; 国家自然科学基金重大项目; 中国国家自然科学基金;
关键词
Wireless sensor network; network security; secure continuous aggregation; sampling; DISTRIBUTED DATA-COLLECTION; CAPACITY;
D O I
10.1109/TPDS.2013.63
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of aggregates. However, in a hostile environment, the adversary could fabricate false temporal variation patterns of the aggregates by manipulating a series of aggregation results through compromised nodes. Existing secure aggregation schemes conduct one individual verification for each aggregation result, which could incur great accumulative communication cost and negative impact on transmission scheduling for continuous aggregation. In this paper, we identify distinct design issues for protecting continuous in-network aggregation and propose a novel scheme to detect false temporal variation patterns. Compared with the existing schemes, our scheme greatly reduces the verification cost by checking only a small part of aggregation results to verify the correctness of the temporal variation patterns in a time window. A sampling-based approach is used to check the aggregation results, which enables our scheme independent of any particular in-network aggregation protocols as opposed to existing schemes. We also propose a series of security mechanisms to protect the sampling process. Both theoretical analysis and simulations show the effectiveness and efficiency of our scheme.
引用
收藏
页码:762 / 774
页数:13
相关论文
共 50 条
  • [1] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [2] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [3] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [4] Secure Continuous Aggregation via Sampling-based Verification in Wireless Sensor Networks
    Yu, Lei
    Li, Jianzhong
    Cheng, Siyao
    Xiong, Shuguang
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 1763 - 1771
  • [5] Secure and reliable data aggregation for wireless sensor networks
    Ozdemir, Suat
    UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4836 : 102 - 109
  • [6] Survey on Secure Data Aggregation in Wireless Sensor Networks
    Gaikwad, Priyanka B.
    Dhage, Manisha R.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 242 - 246
  • [7] Secure and transparent data aggregation for wireless sensor networks
    Guo, Jiang-Hong
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2012, 33 (10): : 51 - 59
  • [8] Secure data aggregation in wireless sensor networks: A survey
    Sang, Yingpeng
    Shen, Hong
    Inoguchi, Yasushi
    Tan, Yasuo
    Xiong, Naixue
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 315 - +
  • [9] A taxonomy of secure data aggregation in wireless sensor networks
    Alzaid, Hani
    Foo, Ernest
    Nieto, Juan Manuel Gonzalez
    Park, DongGook
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 8 (1-2) : 101 - 148
  • [10] Credible Secure Data Aggregation in Wireless Sensor Networks
    Anuradha, M. P.
    Ganapathy, Gopinath
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 395 - 404