Efficient Secure Aggregation in Sensor Networks

  • Pawan Jadia
  • Anish Mathuria
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3296)

Abstract

In many applications of sensor networks, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. The messages that are relayed in the data aggregation hierarchy may need confidentiality. We present a secure data aggregation protocol for sensor networks that uses encryption for confidentiality, but without requiring decryption at intermediate nodes. A salient feature of the protocol is the use of two-hop pairwise keys to provide integrity while minimizing the communication required between the base station and sensor nodes. We analyze the performance of our protocol and compare its efficiency with a protocol proposed by Hu and Evans.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Karl, H., Loebbers, M., Nieberg, T.: A data aggregation framework for wireless sensor networks. In: Proc. Dutch Technology Foundation ProRISC Workshop on Circuits, Systems and Signal Processing, Veldhoven, Netherlands (2003)Google Scholar
  2. 2.
    Deng, J., Han, R., Mishra, S.: Security support for in-network processing in wireless sensor networks. In: Proc. 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN), pp. 83–93 (2003)Google Scholar
  3. 3.
    Zhao, J., Govindan, R., Estrin, D.: Computing aggregates for monitoring wireless sensor networks. In: Proc. IEEE International Workshop on Sensor Net Protocols and Applications, pp. 139–148 (2003)Google Scholar
  4. 4.
    Przydatek, B., Song, D., Perrig, A.: SIA: secure information aggregation in sensor networks. In: Proc. 1st International conference on Embedded networked sensor systems, pp. 255–265 (2003)Google Scholar
  5. 5.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: security protocols for sensor networks. Wireless Network journal (WINE) 8, 521–534 (2002)CrossRefMATHGoogle Scholar
  6. 6.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proc. 10th ACM Conference on Computer and Communications Security (CCS), pp. 62–72 (2003)Google Scholar
  7. 7.
    Hu, L., Evans, D.: Secure aggregation for wireless network. In: Proc. IEEE Symposium on Applications and the Internet Workshops (SAINT 2003), pp. 384–394 (2003)Google Scholar
  8. 8.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE network Magazine 13, 24–30 (1999)CrossRefGoogle Scholar
  9. 9.
    Cam, H., Ozdemir, S., Muthuavinashiappan, D., Nair, P.: Energy-efficient security protocol for wireless sensor networks. In: Proc. 58th IEEE Vehicular Technology Conference, pp. 2981–2984 (2003)Google Scholar
  10. 10.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)Google Scholar
  11. 11.
    Ahituv, N., Lapid, Y., Neumann, S.: Processing encrypted data. Communications of the ACM 30, 777–780 (1987)CrossRefMATHGoogle Scholar
  12. 12.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–213 (2003)Google Scholar
  13. 13.
    Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM Conference on Computer and Communications Security (CCS), pp. 42–51 (2003)Google Scholar
  14. 14.
    Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proc. 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 326–335 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Pawan Jadia
    • 1
  • Anish Mathuria
    • 1
  1. 1.Dhirubhai Ambani Institute of Information and Communication TechnologyGujaratIndia

Personalised recommendations