Selection of aggregator nodes and elimination of false data in wireless sensor networks
- 334 Downloads
- 2 Citations
Abstract
False data elimination is very important in ensuring data integrity in wireless sensor networks. In the existing security mechanisms, the aggregator nodes quickly drain out the batteries due to the computational overhead caused by data aggregation and false data elimination, which leads to reduced network lifetime. In this paper, aggregator node selection and false data elimination scheme is proposed to eliminate the false data injected in heterogeneous wireless sensor networks. In order to balance the battery power consumption among the sensor nodes and to improve the network lifetime, the aggregator nodes are selected periodically based on location, taking advantage of the energy heterogeneity of the sensor nodes in the network. The location based selection of aggregator nodes brings in security challenges in localization and symmetric key exchange. Secure verifiable multilateration technique is employed to resolve the security issues in localization. The problem of symmetric key exchange is resolved by using a cryptographic scheme based on Jacobian Elliptic Chebyshev Rational Map. This scheme provides a better solution when hybrid sensor/mesh architecture cannot be implemented. Simulation results indicate that this scheme offers higher false data filtering and improved network lifetime.
Keywords
False data elimination Heterogeneous wireless sensor networks Jacobian Elliptic Chebyshev Rational Map Location based aggregator selection Symmetric key exchange Secure localization Verifiable multilaterationReferences
- 1.Akyildiz, F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.CrossRefGoogle Scholar
- 2.Hu, N., Wu, C., Ji, P., & Sun, Y. (2013). The deployment algorithm of heterogeneous wireless sensor networks based on energy-balance. In 25th Chinese Control and Decision Conference (CCDC), pp. 2884–2887.Google Scholar
- 3.Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route detection and filtering of injected false data in sensor networks. Proceedings of IEEE INFOCOM, 4, 2446–2457.Google Scholar
- 4.Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Transactions on Sensor Networks. doi: 10.1145/1267060.1267062.
- 5.Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. Proceedings of IEEE VTC, 2, 1223–1227.Google Scholar
- 6.Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.CrossRefGoogle Scholar
- 7.Li, J., Yu, L., Gao, H., & Xiong, S. (2012). Grouping-enhanced resilient probabilistic en-route filtering of injected false data in WSNs. IEEE Transactions on Parallel and Distributed Systems, 23(5), 881–889.CrossRefGoogle Scholar
- 8.Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of SenSys’03, pp. 255–265.Google Scholar
- 9.Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of GLOBECOM’03, pp. 1435–1439.Google Scholar
- 10.Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2007). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks, 5(1), 100–111.CrossRefGoogle Scholar
- 11.Yang, Y., Wang, X., Zhu, S., and Cao, G. (2006). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM MOBIHOC’06.Google Scholar
- 12.Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In IEEE International Conference on MobiQuitous, pp. 109–117.Google Scholar
- 13.Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040–1052.CrossRefGoogle Scholar
- 14.Huang, S. I., Shieh, S., & Tygar, J. D. (2010). Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16(4), 915–927.CrossRefGoogle Scholar
- 15.Ozdemir, S., & Cam, H. (2010). Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–739.CrossRefGoogle Scholar
- 16.Coen-Porisini, A., & Sicari, S. (2012). Cross layer data assessment in wireless sensor networks. SENSORNETS, pp. 203–208.Google Scholar
- 17.Sicari, S., Grieco, L.A., Rizzardi, A., Boggia, G., & Coen-Porisini, A. (2013). SETA: A secure sharing of tasks in clustered wireless sensor networks. In IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 239–246.Google Scholar
- 18.Sicari, S., Coen-Porisini, A., & Riggio, R. (2013). DARE: Evaluating data accuracy using node reputation. Computer Networks, 57, 3098–3111.CrossRefGoogle Scholar
- 19.Li, Y., Xiao, G., Singh, G., & Gupta, R. (2013). Algorithms for finding best locations of cluster heads for minimizing energy consumption in wireless sensor networks. Wireless Networks, 19(7), 1755–1768.CrossRefGoogle Scholar
- 20.Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences (HICSS).Google Scholar
- 21.Thanigaivelu, K., & Murugan, K. (2012). Grid-based clustering with predefined path mobility for mobile sink data collection to extend network lifetime in wireless sensor networks. IETE Technical Review, 29(2), 133–147.CrossRefGoogle Scholar
- 22.Sirivianos, M., Westhoff, D., Armknecht, F., & Girao, J. (2007). Non-manipulable aggregator node election protocols for wireless sensor networks. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).Google Scholar
- 23.Buttyan, L., & Schaffer, P. (2007). PANEL: Position-based aggregator node election in wireless sensor networks. In Proceedings of the 4th IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–9.Google Scholar
- 24.Sandhya, M. K., Murugan, K., & Devaraj, P. (2014). False data elimination in heterogeneous wireless sensor networks using location-based selection of aggregator nodes. IETE Journal of Research, 60(2), 145–155.CrossRefGoogle Scholar
- 25.Capkun, S., & Hubaux, J.-P. (2005). Secure positioning of wireless devices with application to sensor networks. Proceedings of IEEE INFOCOM, 2005(3), 1917–1928.Google Scholar
- 26.Gatti, N., Monga, M., & Sicari, S. (2010). Localization security in wireless sensor networks as a non-cooperative game. In International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 295–300.Google Scholar
- 27.Basilico, N., Gatti, N., Monga, M., & Sicari, S. (2014). Security games for node localization through verifiable multilateration. IEEE Transactions on Dependable and Secure Computing, 11(1), 72–85.CrossRefGoogle Scholar
- 28.Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A pairwise key predistribution scheme for wireless sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51.Google Scholar
- 29.Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information System Security, 8(1), 41–77.CrossRefGoogle Scholar
- 30.Deng, J., & Han, Y. S. (2005). Using MDS codes for the key establishment of wireless sensor networks. Mobile Ad-Hoc and Sensor Networks, Lecture Notes in Computer Science, 3794, 732–744.CrossRefGoogle Scholar
- 31.Dong, Q., & Liu, D. (2007). Using auxiliary sensors for pairwise key establishment in WSN. In: Proceedings of IFIP International Conference on Networking. Atlanta, GA, USA, pp. 251–262.Google Scholar
- 32.Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution scheme for sensor networks. In Proceedings of IEEE symposium on security and privacy, pp. 197–213.Google Scholar
- 33.Zhang, J., & Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33, 63–75.CrossRefGoogle Scholar
- 34.Yu, L., Wang, N., Zhang, W., & Zheng, C. (2007). Deploying a heterogeneous wireless sensor network. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2588–2591.Google Scholar
- 35.Kohda, T., & Fujisaki, T. (2001). Jacobian elliptic Chebyshev rational maps. Physica D: Nonlinear Phenomena, 148, 242–254.CrossRefMathSciNetGoogle Scholar
- 36.Bergamo, P., D’Arco, P., De Santis, A., & Kocarev, L. (2005). Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I: Regular Papers, 52(7), 1382–1393.CrossRefMathSciNetGoogle Scholar
- 37.NS-2—The network simulator version 2.32. [online] http://www.isi.edu/nsnam/ns/. Accessed September 12, 2012.
- 38.Bouckaert, S., De Poorter, E., De Mil, P., Moerman, I., & Demeester, P. (2009). Interconnecting wireless sensor and wireless mesh networks: Challenges and strategies. In IEEE Global Telecommunications Conference, 2009, pp. 1–7.Google Scholar