Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks

  • Hongjuan Li
  • Keqiu Li
  • Wenyu Qu
  • Ivan Stojmenovic
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7016)

Abstract

Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong the network lifetime. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. Previous secure data aggregation schemes have tackled this problem from different angles. The goal of those algorithms is to ensure that the Base Station (BS) does not accept any forged aggregation results. But none of them have tried to detect the nodes that inject into the network bogus aggregation results. Moreover, most of them usually have a communication overhead that is (at best) logarithmic per node. In this paper, we propose a secure and energy-efficient data aggregation scheme that can detect the malicious nodes with a constant per node communication overhead. In our solution, all aggregation results are signed with the private keys of the aggregators so that they cannot be altered by others. Nodes on each link additionally use their pairwise shared key for secure communications. Each node receives the aggregation results from its parent (sent by the parent of its parent) and its siblings (via its parent node), and verifies the aggregation result of the parent node. Theoretical analysis on energy consumption and communication overhead accords with our comparison based simulation study over random data aggregation trees.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Intermediate Node Child Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41–49 (2004)CrossRefGoogle Scholar
  2. 2.
    Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 263–270 (1999)Google Scholar
  3. 3.
    Heidemann, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D., Ganesan, D.: Building efficient wireless sensor networks with low-level naming. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), pp. 146–159 (2001)Google Scholar
  4. 4.
    Krishnamachari, B., Estrin, D., Wicker, S.: The impact of data aggregation in wireless sensor networks. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS) Workshops, pp. 575–578 (2002)Google Scholar
  5. 5.
    Yu, Y., Krishnamachari, B., Prasanna, V.K.: Energy-latency tradeoffs for data gathering in wireless sensor networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2004)Google Scholar
  6. 6.
    Madden, S., Franklin, M.J., Hellerstein, J.M.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proceedings of the Symposium on Operating Systems Design and Implementation, OSDI (2002)Google Scholar
  7. 7.
    Ding, M., Chen, D., Xing, K., Cheng, X.: Localized Faulty-Tolerant Event Boundary Detection in Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2005)Google Scholar
  8. 8.
    Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proceedings of the IEEE Symposim on Security and Privacy (SP), pp. 49–63 (2005)Google Scholar
  9. 9.
    Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of the ACM Conference on Computer and Communication Security, CCS (2006)Google Scholar
  10. 10.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor network. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Sensys (2003)Google Scholar
  11. 11.
    Du, W., Deng, J., Han, Y., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM (2003)Google Scholar
  12. 12.
    Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2006)Google Scholar
  13. 13.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  14. 14.
    Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops, SAINTW (2003)Google Scholar
  15. 15.
    Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. In: Proceedings of the International Conference on Mobile and Ubiquitous Systems, Mobiquitous (2005)Google Scholar
  16. 16.
    He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2007)Google Scholar
  17. 17.
    Itanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking, MobiCom (2000)Google Scholar
  18. 18.
    Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of Network Density on Data Aggregation in Wireless Sensor Networks. In: Proceedings of the International Conference on Distributed Computing Systems, ICDCS (2002)Google Scholar
  19. 19.
    Tang, X., Xu, J.: Extending network lifetime for precision constrained data aggregation in wireless sensor networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2006)Google Scholar
  20. 20.
    Ding, M., Chen, D., Xing, K., Cheng, X.: Localized Fault-Tolerant Event Boundary Detection in Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies (INFOCOM), March 13-17, pp. 902–913 (2005)Google Scholar
  21. 21.
    Liu, F., Cheng, X., Chen, D.: Insider Attacker Detection in Wireless Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies (INFOCOM), May 6-12, pp. 1937–1945 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Hongjuan Li
    • 1
  • Keqiu Li
    • 1
  • Wenyu Qu
    • 2
  • Ivan Stojmenovic
    • 3
  1. 1.School of Computer Science and TechnologyDalian University of TechnologyDalianChina
  2. 2.School of Information Science and TechnologyDalian Maritime UniversityDalianChina
  3. 3.SITEUniversity of OttawaOntarioCanada

Personalised recommendations