SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks

  • Chakib Bekara
  • Maryline Laurent-Maknavicius
  • Kheira Bekara
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4864)


To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that all nodes in the network send their data to the BS. Security plays a major role in data aggregation process, especially that aggregators are more attractive for attackers than normal nodes, where compromising few aggregators can significantly affect the final result of aggregation. In this paper, we present SAPC, a secure aggregation protocol for cluster-based WSN, which does not rely on trusted aggregator nodes and thus is immune to aggregators compromising. In addition to security performance, SAPC has a low transmission overhead.


WSN Cluster-based WSN Data Aggregation Security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.: Wireless sensor networks: a survey. Computer Networks (38), 393–422 (2002)Google Scholar
  2. 2.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: SenSys 2004 (November 3-5, 2004)Google Scholar
  3. 3.
    Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: Spins: Security protocols for sensor networks. In: Proc. of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 189–199 (2001)Google Scholar
  4. 4.
    Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad Hoc Networks 3, 325–349 (2005)CrossRefGoogle Scholar
  5. 5.
    Krishnamachari, B., Estrin, D., Wicker, S.: The Impact of Data Aggregation in Wireless Sensor Network. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 575–578 (July 2-5, 2002)Google Scholar
  6. 6.
    IntanagonwiI., C., Akyildiz, F., Su, W., Sankarasubramaniam, Y.: Wireless sensor networks: a survey. Computer Networks (38), 393–422 (2002)Google Scholar
  7. 7.
    Estrin, D., Govindin, R.: Impact of Network Density on Data Aggregation in Wireless Sensor. In: Proceedings of the 22 nd International Conference on Distributed Computing Systems, pp. 457–458 (July 2-5, 2002)Google Scholar
  8. 8.
    AI-Karaki, J.N., UI-Mustafa, R., Kamal, A.E.: Data Aggregation in Wireless Sensor Networks - Exact and Approximate Algorithms. In: Workshop on High Performance Switching and Routing, pp. 241–245 (April 19-21, 2004)Google Scholar
  9. 9.
    Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops, p. 384 (2003)Google Scholar
  10. 10.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: SenSys 2003 (November 5-7, 2003)Google Scholar
  11. 11.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 259–271 (May 9-12, 2004)Google Scholar
  12. 12.
    Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
  13. 13.
    Blom, R.: An Optimal Class of Symmetric Key Generation. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)Google Scholar
  14. 14.
    Chan, H., Perrig, A., Song, D.: Random Key Predistibution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, Okland, California, USA, pp. 197–213 (2003)Google Scholar
  15. 15.
    Dimitriou, T.T., Krontiris, I.: A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks. In: Proc. of the 19th IEEE International Parallel and Distributed Processing Symposium (2005)Google Scholar
  16. 16.
    Heinzelman, H., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (January 4-7, 2000)Google Scholar
  17. 17.
    Manjeshwar, A., Agrawal, D.: TEEN: A protocol for enhanced efficiency in WSN. In: Proceedings of the 15th International Parallel & Distributed Processing Symposium, pp. 2009–2015 (April 23-27, 2001)Google Scholar
  18. 18.
    Manjeshwar, A., Agrawal, D.: APTEEN: A hybrid protocol for efficient routng and a comprehensive information retrieval in WSN. In: Proceedings of the International Parallel and Distributed Processing Symposium, pp. 195–202 (April 15-19, 2002)Google Scholar
  19. 19.
    Sun, K., Peng, P., Ning, P., Wang, C.: Secure distributed cluster formation in wireless sensor networks. In: 22nd Annual Computer Security Applications Conference (December 11-15, 2006)Google Scholar
  20. 20.
    Grey, M., Jonhnson, D.: Computers and intracrbility: A guide to theory of NP-Completeness. W.H Freeman and Company, New York (1979)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Chakib Bekara
    • 1
  • Maryline Laurent-Maknavicius
    • 1
  • Kheira Bekara
    • 1
  1. 1.Institut National des Télécommunications d’Evry, 9 rue Charles Fourier, 91000 Evry CedexFrance

Personalised recommendations