EuroNGI 2008: Wireless Systems and Mobility in Next Generation Internet pp 37-48 | Cite as
Secure and Efficient Data Collection in Sensor Networks
Abstract
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed data and at the same time minimize the battery energy consumption. This paper proposes an efficient way to perform data collection by grouping the sensors in aggregation zones, allowing the aggregators to process the sensed data inside the aggregation zone in order to minimize the amount of transmissions to the sink. Moreover, the paper provides a security mechanism based on hash chains to secure data transmissions in networks with low capability sensors and without the requirements of an instantaneous source authentication.
Keywords
Sensor Network Sensor Node Wireless Sensor Network Message Authentication Code Hash ChainPreview
Unable to display preview. Download preview PDF.
References
- 1.Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRefGoogle Scholar
- 2.Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. Internet Request for Comments RFC 3561 (November 2003)Google Scholar
- 3.Clausen, T., Jacquet, P. (eds.) Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized link state routing protocol (olsr). RFC 3626, Network Working Group (October 2003)Google Scholar
- 4.Hauser, R., Przygienda, A., Tsudik, G.: Reducing the cost of security in link state routing. In: Symposium on Network and Distributed Systems Security (NDSS 1997), San Diego, California, February 1997, pp. 93–99. Internet Society (1997)Google Scholar
- 5.Cheung, S.: An efficient message authentication scheme for link state routing. In: 13th Annual Computer Security Applications Conference, pp. 90–98 (1997)Google Scholar
- 6.Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189–199 (2001)Google Scholar
- 7.Zhang, K.: Efficient protocols for signing routing messages. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 1998) (July 2001)Google Scholar
- 8.Asokan, N.: Presentation at an informal workshop on mobile and ad hoc networking security, EPFL, Lausanne (December 2001)Google Scholar
- 9.Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September 2002, pp. 1–10 (2002)Google Scholar
- 10.Hu, Y.C., Johnson, D., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)Google Scholar
- 11.Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual International Conference on Mobile Computing and Networking, pp. 85–97 (1998)Google Scholar
- 12.Krishnamachari, B., Estrin, D., Wicker, S.B.: The impact of data aggregation in wireless sensor networks. In: ICDCSW 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems, Washington, DC, USA, pp. 575–578. IEEE Computer Society, Los Alamitos (2002)Google Scholar
- 13.Kalpakis, K., Dasgupta, K., Namjoshi, P.: Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks. Comput. Networks 42(6), 697–716 (2003)CrossRefMATHGoogle Scholar
- 14.Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: ACM SenSys 2003 (November 2003)Google Scholar
- 15.Chen, G., Szymanski, B.K.: Cost: A component-oriented discrete event simulator. In: Proceedings of the 2002 Winter Simulation Conference, pp. 776–782 (2002)Google Scholar