SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
- 402 Downloads
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
KeywordsData aggregation Digital watermarking Security Wireless sensor networks Energy efficiency
This work was supported in part by NDC Lab, KICT, IIUM, PROMEP—UQROO-PTC-110, and LaSTIC Laboratory, Department of Computer Science, University of Batna, Algeria.
- 2.Hu, L., & Evans, D. (2003). Secure aggregation for wireless network. In Proceeding of the 2003 Symposium on Applications and the Internet Workshop, SAINT’03 (pp. 384–394). FL, USA: Orlando.Google Scholar
- 3.Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor Networks. In Procceding of the 60th IEEE Global Communications Conference, GLOBECOM’04 (pp. 1435–1439) San Francisco, USA, 3Google Scholar
- 4.Jadia, P., & Mathuria, A. (2004). Efficient secure aggregation in sensor networks. In Proceedings of the 11th conference on High Performance Computing, HiPC’04 (pp. 40–49) Bangalore, India, 3296Google Scholar
- 5.Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In Proceedings of IEEE Global Telecommunications Conference (pp. 2175–2179) GLOBECOM ’04Google Scholar
- 6.Sanli, H. O., Ozdemir, S., & Cam, H. (2004). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In IEEE 60 th Vehicular Technology Conference. VTC2004-Fall(pp. 4650–4654.), vol. 7Google Scholar
- 7.Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of the Conference on Mobile and Ubiquitous Systems: Networking and Services, (pp. 109–117)Google Scholar
- 8.Bagaa, M., Lasla, N., Ouadjaout, A., & Challal, Y. (2007). SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. In 32nd IEEE Conference on Local Computer Networks, 2007. LCN 2007. pp.1053–1060)Google Scholar
- 12.Kuttyamma, A. J., & Chinchu Krishna, S. (2013). Secure data accumulation and certification procedure for sensor networks. IOSR Journal of Engineering (IOSRJEN), 43–46Google Scholar
- 15.Chan, H., Perrig, A., & Song, D. (2006). Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the 13th ACM Conference on Computer and Communications, (pp. 278–287)Google Scholar
- 16.Sun, X., Su, J., Wang, B., & Liu, Q. (2013). Digital watermarking method for data integrity protection in wireless sensor networks. International Journal of Security and Its Applications, 7(4), 407–416.Google Scholar
- 19.Eastlake, D., & Jones, P. (2001). RFC3174: US Secure Hash Algorithm 1 (SHA-1). http://www.faqs.org/rfcs/rfc3174.html.
- 20.Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., & Sichitiu, M. (2003). Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (pp. 151–159)Google Scholar
- 21.Sankarasubramaniam, Y., Akyildiz, I. F., & McLaughlin, S. W. (2003). Energy efficiency based packet size optimization in wireless sensor networks. In 2003 IEEE International Workshop on Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE, (pp. 1–8)Google Scholar
- 22.Vuran, M. C., & Akyildiz, I. F. (2008). Cross-layer packet size optimization for wireless terrestrial, underwater, and underground sensor networks. In INFOCOM 2008. The 27th Conference on Computer Communications, (pp. 780–788).Google Scholar
- 24.Dener, D. (2014). Optimum packet length over data transmission for wireless sensor networks. In Proceedings of the 8th International Conference on Sensing Technology (pp. 52–56). UK: Liverpool.Google Scholar
- 25.The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/ [last accessed: 17 Oct, 2014]
- 27.Wei, Y. E., Heidemann, J., & et Estrin, D. (2002). An energy-efficient MAC protocol for wireless sensor networks. In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. IEEE, 2002. (pp. 1567–1576).Google Scholar
- 31.Chang, C. C., Muftic, S., & Nagel, D. J. (2007). Measurement of energy costs of security in wireless sensor nodes. In Computer Communications and Networks, 2007. ICCCN 2007. Proceedings of 16th International Conference on, (pp. 95–102).Google Scholar
- 32.Solis, I., & Obraczka, K. (2004). The impact of timing in data aggregation for sensor networks. In 2004 IEEE International Conference on Communications, vol. 6, (pp. 3640–3645).Google Scholar