Abstract
The rapid development of wireless sensor networks motivates the researchers and industries to implement large scale wireless sensor network in highly sensitive applications. Since the data aggregation is the major functionality of the wireless sensor network, the network implementation should avoid data aggregation issues like energy, collision, delay and security. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as authenticity, confidentiality and integrity should be considered. To provide a unique solution that resolve the security and energy issues, this paper proposes a hybrid secure data aggregation (HSDA) to provide high secure data aggregation in an energy efficient way. HSDA implements an end to end symmetric key cryptography for secure authentication using shared public key and it uses hop by hop asymmetric key cryptography with the private keys of each node for data integrity and confidentiality. The proposed model performs the private key generation and encryption at the leaf node to reduce the communication and computation overhead of the sensor nodes. The proposed energy efficient way for achieving the secure data aggregation is proved through simulation results. Compared with existing models, the proposed model provides a new solution that resolves energy as well as security issues in data aggregation.
Similar content being viewed by others
References
Alzaid, H. & Alfaraj, M. (2008). MASA: End-to-end data security in sensor networks using a mix of asymmetric and symmetric approaches. In: New technologies, mobility and security. NTMS’08. (pp. 1–5). IEEE.
Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In Mobile and ubiquitous systems: networking and services, 2005. MobiQuitous 2005. The Second Annual International Conference on (pp. 109–117). IEEE.
Dhasian, H., & Balasubramanian, P. (2013). Survey of data aggregation techniques using soft computing in wireless sensor networks. Information Security IET, 7(4), 336–342.
Feng, J., Wang, Z., & Henkel, J. (2012). An adaptive data gathering strategy for target tracking in cluster-based wireless sensor networks. In: Computers and Communications (ISCC), 2012 IEEE Symposium on (pp. 000468–000474). IEEE.
Gupta, P., & Kumar, P. R. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2), 388–404.
Han, K., Luo, J., Liu, Y., & Vasilakos, A. V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.
Hu, W., Corke, P., Shih, W. C., & Overs, L. (2009) secfleck: A public key technology platform for wireless sensor networks. In: Wireless sensor networks (pp. 296–311). Berlin: Springer
IFerrer, J. D. (1996). A new privacy homomorphism and applications. Information Processing Letters, 60(5), 277–282.
Jailin, S., Kayalvizhi, R., & Vaidehi, V. (2011). Performance analysis of hybrid cryptography for secured data aggregation in wireless sensor networks. In 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp. 307–312.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Liu, X. Y., Zhu, Y., Kong, L., Liu, C., Gu, Y., Vasilakos, A. V., & Wu, M. Y. (2014). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197.
Niu, S., Wang, C., Yu, Z., & Cao, S. (2013). Lossy data aggregation integrity scheme in wireless sensor networks. Computers and Electrical Engineering, 39(6), 1726–1735.
Ozdemir, S., & Çam, H. (2010). Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking (TON), 18(3), 736–749.
Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12), 2022–2037.
Ozdemir, Suat, & Xiao, Yang. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735–1746.
Poornima, A. S., & Amberker, B. B. (2013). Secure end-to-end data aggregation (seeda) protocols for wireless sensor networks. Ad-hoc and Sensor Wireless Networks, 17(3–4), 193–219.
Prasad, N. R., & Alam, M. (2006). Security framework for wireless sensor networks. Wireless Personal Communications, 37(3–4), 455–469.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.
Roy, S., Conti, M., Setia, S., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security, 9(4), 681–694.
Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.
Setia, S., Roy, S., & Jajodia, S. (2008). Secure data aggregation in wireless sensor networks. Wireless Sensor Network Security, 1, 204–222.
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.
Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems. ACM, pp. 214–226.
Tahir, R., Javed, M. Y., Ahmad, A., & Iqbal, R. (2008). SCUR: Secure Communications in Wireless Sensor Networks using Rabbit. In Proceedings of the World Congress on Engineering, Vol 1, pp. 2–4.
Tseng, Y. C., Pan, M. S., & Tsai, Y. Y. (2006). A distributed emergency navigation algorithm for wireless sensor networks. IEEE Computers, 39(7), 55–62.
Wheeler, A. (2007). Commercial applications of wireless sensor networks using ZigBee. IEEE Communications Magazine, 45(4), 70–77.
Wang, X., Li, J., Peng, X., & Zou, B. (2010). Secure and efficient data aggregation for wireless sensor networks. In Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd (pp. 1–5). IEEE.
Westhoff, D., Girao, J., & Acharya, M. (2006). Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(10), 1417–1431.
Wei, G., Ling, Y., Guo, B., Xiao, B., & Vasilakos, A. V. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Computer Communications, 34(6), 793–802.
Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Du, D. Z., & Vasilakos, A. V. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.
Xu, X., Ansari, R., Khokhar, A., & Vasilakos, A. V. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45.
Xu, X., Li, X. Y., Mao, X., Tang, S., & Wang, S. (2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175.
Yadav, R. B., & Ramaiah, S. S. A Framework: Secure data aggregation in wireless sensor networks.
Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks.
Yao, Y., Cao, Q., & Vasilakos, A. V. (2013, October). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In Mobile ad-hoc and sensor systems (MASS), 2013 IEEE 10th international conference on IEEE, pp. 182–190.
Yu, B., Li, J., & Li, Y. (2009, April). Distributed data aggregation scheduling in wireless sensor networks. In INFOCOM 2009, IEEE, pp. 2159–2167.
Zhou, Q., Yang, G., & He, L. (2014). An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. International Journal of Distributed Sensor Networks
Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wireless Communications, 22(2), 136–144.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gopikrishnan, S., Priakanth, P. HSDA: hybrid communication for secure data aggregation in wireless sensor network. Wireless Netw 22, 1061–1078 (2016). https://doi.org/10.1007/s11276-015-1122-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1122-x