A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 309)

Abstract

Achieving security in case of data aggregation in wireless sensor network (WSN) is a challenging task because of its limitations in terms of computation, resources, battery power, transmission capabilities, etc. This paper provides a comprehensive discussion on literature of security concerns in data aggregation in WSNs. Main contributions of this paper are describing the fundamentals of secure data aggregation in WSN, identifying the important parameters for the classification of secure data aggregation techniques for WSN, considering key characteristics of existing secure data aggregation techniques, comparing the existing secure data aggregation techniques, and introducing table of comparison based on various parameters such as security principles, prevention of attacks by protocols, aggregation function, and cryptographic techniques used.

Keywords

Data aggregation Security WSN 

References

  1. 1.
    Pathan, A.-S.K., Islam, H.K., Sayeed, S.A., Ahmed, F., Hong, C.S.: A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. Appeared in IEEE ICNEWS (2006)Google Scholar
  2. 2.
    Chan, H., Perrig, A.: Security and privacy in sensor networks. Carnegie Mellon University, pp. 99–101Google Scholar
  3. 3.
    Welsh, M., Myung, D., Gaynor, M., Moulton, S.: Resuscitation monitoring with a wireless sensor network. In: Supplement to Circulation. J. Am. Heart Assoc. (2003)Google Scholar
  4. 4.
    Mainwaring, A., Polastre, J., Szewczyk, R., Culler, R.: Wireless sensor networks for habitat monitoring. In: First ACM International Workshop on Wireless Sensor Networks and Applications (2002)Google Scholar
  5. 5.
    Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: First European Workshop on Wireless Sensor Networks (EWSN’04) (2004)Google Scholar
  6. 6.
    Duckworth, G.L., Gilbert, D.C., Barger, J.E.: Acoustic counter-sniper system. In: SPIE International symposium on Enabling Technologies for Law Enforcement and Security (1996)Google Scholar
  7. 7.
    Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based counter sniper system. In: Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD (2004)Google Scholar
  8. 8.
    Castillo-Effen, M., Quintela, D.H., Jordan, R., Westhoff, W., Moreno, W.: Wireless sensor networks for flash-flood alerting. In: Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits, and Systems, Dominican Republic (2004)Google Scholar
  9. 9.
    Gao, T., Greenspan, D., Welsh, M., Juang, R.R., Alm, A.: Vital signs monitoring and patient tracking over a wireless network. In: Proceedings of the 27th IEEE EMBS Annual International Conference (2005)Google Scholar
  10. 10.
    Lorincz, K., Malan, D., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S.: Sensor networks for emergency response: challenges and opportunities. In: Pervasive Computing for First Response (Special Issue), IEEE Pervasive Computing (2004)Google Scholar
  11. 11.
    Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy efficient sensor networks. University of Twente, EA Enshede, Netherlands (2002)Google Scholar
  12. 12.
    Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless communication (2007)Google Scholar
  13. 13.
    Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL (2003)Google Scholar
  14. 14.
    Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the ACM MOBIHOC’06, New York, USA, pp. 356–367 (2006)Google Scholar
  15. 15.
    S. Ozdemir.: Secure and reliable data aggregation for wireless sensor networks. LNCS, volume 4836, pp. 102–109 (2007)Google Scholar
  16. 16.
    Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5(10), 1417–1431(2006)Google Scholar
  17. 17.
    Sun, H.M., Lin, Y.H., Hsiao, Y.C., Chen, C.M.: An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. In: Proceedings of ICESS08, pp. 19–26 (2008)Google Scholar
  18. 18.
    Castellucia, C., Chan, C.F., Mykletum, E., Tsudik, G.: Efficiently provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5(3) (2009)Google Scholar
  19. 19.
    Ozdemir, S.: Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In: Proceedings of the ICPS’07: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007)Google Scholar
  20. 20.
    Bahi, J.M., Guyeux, C., Makhoul, A.: Efficient and robust secure aggregation of encrypted data in sensor networks. In: proceedings of Fourth International Conference on Sensor Technologies and Applications, pp. 472–477 (2010)Google Scholar
  21. 21.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), pp. 1435–1439 (2003)Google Scholar
  22. 22.
    Ozdemir, S., Çam, H.: Integration of false data detection with data aggregation and confidential transmission in WSN. IEEE/ACM Trans. Netw. 18(3) (2010)Google Scholar
  23. 23.
    Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34, 591–597 (2011)CrossRefGoogle Scholar
  24. 24.
    Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011). ElsevierCrossRefGoogle Scholar
  25. 25.
    Ozdemir, S., Xiao, Y.: FTDA: outlier detection based fault tolerant data aggregation for WSN. In: Security and Communication Networks (2012)Google Scholar
  26. 26.
    Roy, S., Setia, S., Jajodia, S.: Secure data aggregation in WSN. IEEE Trans. Inf. Forensics 7(3), 1040–1052 (2012)CrossRefGoogle Scholar
  27. 27.
    Chen, C.M., Lin, Y.H.: SASHIMI: Secure aggregation via successively hierarchical inspecting of message integrity on WSN. J. Inf. Hiding Multimedia Signal Process. 4(1) (2013)Google Scholar
  28. 28.
    Hur, J., Lee, Y., Hong, S., Yoon, H.: Trust-based secure aggregation in wireless sensor networks. In: Proceedings: The 3rd International Conference on Computing, Communications and Control Technologies: CCCT (2005)Google Scholar
  29. 29.
    Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proceedings IEEE SECON’06 (2006)Google Scholar
  30. 30.
    Perez-Toro, C.R., Panta, R.K., Bagchi, S.: Reputation based resilient data aggregation. In: Proceedings of IEEE SECON (2010)Google Scholar
  31. 31.
    Farooq, M.U.: Computational intelligence based data aggregation technique for WSN. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, 24–26 Oct, San Francisco, USA (2012)Google Scholar
  32. 32.
    Bahanfar, S., Kousha, H., Darougaran, L.: Neural network for error detection and data aggregation in WSN. IJCSI 8(5–3) (2011)Google Scholar
  33. 33.
    Hevin Rajesh, D., Paramasivan, B.: Fuzzy based secure data aggregation technique in WSN. J. Comput. Sci. 8(6), 899–907 (2012)CrossRefGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of CSENational Institute of TechnologyHamirpurIndia

Personalised recommendations