Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks

  • Ying Liu
  • Hui Peng
  • Yuncheng Wu
  • Juru Zeng
  • Hong Chen
  • Ke Wang
  • Weiling Lai
  • Cuiping Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10827)


In recent years, wireless sensor networks (WSNs) have become a useful tool for environmental monitoring and information collection due to their strong sensory ability. Whereas WSNs utilize wireless communication and is usually deployed in an outdoors environment, which make them vulnerable to be attacked and then lead to the privacy disclosure of the monitored environment. SUM, as one common query among the queries of WSNs, is important to acquire a high-level understanding of the monitored environment and establish the basis for other advanced queries. In this paper, we present a secure hash-based privacy preservation mechanism called HP2M, which not only preserves the privacy of the monitored environment during SUM aggregation query, but also could achieve exact SUM aggregation. Furthermore, an integrity verification mechanism is proposed to verify the integrity of SUM aggregation result, which could alarm the system once data packets transmitted through the networks are modified. One main characteristic of HP2M and the proposed integrity verification mechanism is that they are lightweight with a small bandwidth consumption. Finally, some numerical experiments are performed to demonstrate the efficiency of our proposed approach.



This work is supported by National Science Foundation of China (No. 61532021, 61772537, 61772536, 61702522), and National Key R & D program of China (No. 2016YFB1000702).


  1. 1.
    Chen, C., Lin, M., Lin, W.: Designing and implementing a lightweight WSN MAC protocol for smart home networking applications. J. Circ. Syst. Comput. 26(03), 1–20 (2017)CrossRefGoogle Scholar
  2. 2.
    Yang, Z.P., Huang, Q.Z., Wang, M.: Study on application of wireless sensor networks in military highway transportation battlefield environment. Equip. Environ. Eng. 11(03), 78–82 (2014)Google Scholar
  3. 3.
    Ramadan, R., Elfouly, F., Mahmoud, M., Dessouky, M.: Efficient data reporting in a single and multi-object tracking using WSNs. In: IEEE Symposium Series on Computational Intelligence (2015)Google Scholar
  4. 4.
    Badescu, A.M., Cotofana, L.: A wireless sensor network to monitor and protect tigers in the wild. Ecol. Ind. 57, 447–451 (2015)CrossRefGoogle Scholar
  5. 5.
    Lupu, T.-G., Rudas, I., Demiralp, M., Mastorakis, N.: Main types of attacks in wireless sensor networks. In: WSEAS Proceedings International Conference on Recent Advances in Computer Engineering, no. 9 (2009)Google Scholar
  6. 6.
    Ali, A.W., et al.: Energy efficieny in routing protocol and data collection approaches for WSN: a survey. In: 2015 International Conference on Computing, Communication and Automation (ICCCA), pp. 540–545 (2015)Google Scholar
  7. 7.
    Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: a survey. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 315–320 (2006)Google Scholar
  8. 8.
    Morell, A., Correa, A., Barcelo, M., Vicario, J.L.: Data aggregation and principal component analysis in WSNs. IEEE Trans. Wirel. Commun. 15(6), 3908–3919 (2016)CrossRefGoogle Scholar
  9. 9.
    YongJian, F., Hong, C., Ying, Z.X.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1131–1146 (2012)MathSciNetCrossRefGoogle Scholar
  10. 10.
    He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007)Google Scholar
  11. 11.
    He, W., Nguyen, H., Liu, X., Nahrstedt, K.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Military Communications Conference, MILCOM 2008, pp. 1–7 (2008)Google Scholar
  12. 12.
    Li, C., Liu, Y.: ESMART: energy-efficient slice-mix-aggregate for wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(2), 1–9 (2013)Google Scholar
  13. 13.
    Papadopoulos, S., Kiayias, A., Papadias, D.: Secure and efficient in-network processing of exact SUM queries. In: IEEE International Conference on Data Engineering, pp. 517–528 (2011)Google Scholar
  14. 14.
    Desai, H.K., Jinwala, D.C.: Secure aggregation of exact sum queries with integrity protection for wireless sensor networks. Int. J. Comput. Appl. 73(15), 9–17 (2013)Google Scholar
  15. 15.
    Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings of IEEE INFOCOM, pp. 2024–2032 (2011)Google Scholar
  16. 16.
    Chen, W., Yu, L., Gao, D.: A privacy preserving histogram aggregation algorithm with integrity verification support. Chin. J. Electron. 42(11), 2268–2272 (2014)Google Scholar
  17. 17.
    Pavithra, M.N., Chinnaswamy, C.N., Sreenivas, T.H.: Privacy preservation scheme for WSNs using signature and trust value computation. Int. J. Eng. Tech. Res. 5(6), 50–53 (2016)Google Scholar
  18. 18.
    Agrawal, S., Das, M.L., Mathuria, A., Srivastava, S.: Program integrity verification for detecting node capture attack in wireless sensor network. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 419–440. Springer, Cham (2015). Scholar
  19. 19.
    Al-Riyami, A., Zhang, N., Keane, J.: An adaptive early node compromise detection scheme for hierarchical WSNs. IEEE Access 4, 4183–4206 (2016)CrossRefGoogle Scholar
  20. 20.
    Nath, S., Yu, H., Chan, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June–July 2009, pp. 31–44 (2009)Google Scholar
  21. 21.
    Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Symposium on Operating Systems Design and Implementation Copyright Restrictions Prevent ACM From Being Able To Make the Pdfs for This Conference Available for Downloading, pp. 131–146 (2002)Google Scholar
  22. 22.
  23. 23.
  24. 24.

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Ying Liu
    • 1
    • 2
  • Hui Peng
    • 3
  • Yuncheng Wu
    • 1
    • 2
  • Juru Zeng
    • 1
    • 2
  • Hong Chen
    • 1
    • 2
  • Ke Wang
    • 4
  • Weiling Lai
    • 1
    • 2
  • Cuiping Li
    • 1
    • 2
  1. 1.Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of EducationBeijingChina
  2. 2.School of InformationRenmin University of ChinaBeijingChina
  3. 3.The Fifth Electronic Research Institute of MIITGuangzhouChina
  4. 4.School of Computing ScienceSimon Fraser UniversityBurnabyCanada

Personalised recommendations