Skip to main content

Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Database Systems for Advanced Applications (DASFAA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10827))

Included in the following conference series:

Abstract

In recent years, wireless sensor networks (WSNs) have become a useful tool for environmental monitoring and information collection due to their strong sensory ability. Whereas WSNs utilize wireless communication and is usually deployed in an outdoors environment, which make them vulnerable to be attacked and then lead to the privacy disclosure of the monitored environment. SUM, as one common query among the queries of WSNs, is important to acquire a high-level understanding of the monitored environment and establish the basis for other advanced queries. In this paper, we present a secure hash-based privacy preservation mechanism called HP2M, which not only preserves the privacy of the monitored environment during SUM aggregation query, but also could achieve exact SUM aggregation. Furthermore, an integrity verification mechanism is proposed to verify the integrity of SUM aggregation result, which could alarm the system once data packets transmitted through the networks are modified. One main characteristic of HP2M and the proposed integrity verification mechanism is that they are lightweight with a small bandwidth consumption. Finally, some numerical experiments are performed to demonstrate the efficiency of our proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, C., Lin, M., Lin, W.: Designing and implementing a lightweight WSN MAC protocol for smart home networking applications. J. Circ. Syst. Comput. 26(03), 1–20 (2017)

    Article  Google Scholar 

  2. Yang, Z.P., Huang, Q.Z., Wang, M.: Study on application of wireless sensor networks in military highway transportation battlefield environment. Equip. Environ. Eng. 11(03), 78–82 (2014)

    Google Scholar 

  3. Ramadan, R., Elfouly, F., Mahmoud, M., Dessouky, M.: Efficient data reporting in a single and multi-object tracking using WSNs. In: IEEE Symposium Series on Computational Intelligence (2015)

    Google Scholar 

  4. Badescu, A.M., Cotofana, L.: A wireless sensor network to monitor and protect tigers in the wild. Ecol. Ind. 57, 447–451 (2015)

    Article  Google Scholar 

  5. Lupu, T.-G., Rudas, I., Demiralp, M., Mastorakis, N.: Main types of attacks in wireless sensor networks. In: WSEAS Proceedings International Conference on Recent Advances in Computer Engineering, no. 9 (2009)

    Google Scholar 

  6. Ali, A.W., et al.: Energy efficieny in routing protocol and data collection approaches for WSN: a survey. In: 2015 International Conference on Computing, Communication and Automation (ICCCA), pp. 540–545 (2015)

    Google Scholar 

  7. Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: a survey. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 315–320 (2006)

    Google Scholar 

  8. Morell, A., Correa, A., Barcelo, M., Vicario, J.L.: Data aggregation and principal component analysis in WSNs. IEEE Trans. Wirel. Commun. 15(6), 3908–3919 (2016)

    Article  Google Scholar 

  9. YongJian, F., Hong, C., Ying, Z.X.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1131–1146 (2012)

    Article  MathSciNet  Google Scholar 

  10. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007)

    Google Scholar 

  11. He, W., Nguyen, H., Liu, X., Nahrstedt, K.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Military Communications Conference, MILCOM 2008, pp. 1–7 (2008)

    Google Scholar 

  12. Li, C., Liu, Y.: ESMART: energy-efficient slice-mix-aggregate for wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(2), 1–9 (2013)

    Google Scholar 

  13. Papadopoulos, S., Kiayias, A., Papadias, D.: Secure and efficient in-network processing of exact SUM queries. In: IEEE International Conference on Data Engineering, pp. 517–528 (2011)

    Google Scholar 

  14. Desai, H.K., Jinwala, D.C.: Secure aggregation of exact sum queries with integrity protection for wireless sensor networks. Int. J. Comput. Appl. 73(15), 9–17 (2013)

    Google Scholar 

  15. Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings of IEEE INFOCOM, pp. 2024–2032 (2011)

    Google Scholar 

  16. Chen, W., Yu, L., Gao, D.: A privacy preserving histogram aggregation algorithm with integrity verification support. Chin. J. Electron. 42(11), 2268–2272 (2014)

    Google Scholar 

  17. Pavithra, M.N., Chinnaswamy, C.N., Sreenivas, T.H.: Privacy preservation scheme for WSNs using signature and trust value computation. Int. J. Eng. Tech. Res. 5(6), 50–53 (2016)

    Google Scholar 

  18. Agrawal, S., Das, M.L., Mathuria, A., Srivastava, S.: Program integrity verification for detecting node capture attack in wireless sensor network. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 419–440. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26961-0_25

    Chapter  Google Scholar 

  19. Al-Riyami, A., Zhang, N., Keane, J.: An adaptive early node compromise detection scheme for hierarchical WSNs. IEEE Access 4, 4183–4206 (2016)

    Article  Google Scholar 

  20. Nath, S., Yu, H., Chan, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June–July 2009, pp. 31–44 (2009)

    Google Scholar 

  21. Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Symposium on Operating Systems Design and Implementation Copyright Restrictions Prevent ACM From Being Able To Make the Pdfs for This Conference Available for Downloading, pp. 131–146 (2002)

    Article  Google Scholar 

  22. Cryptographic hash function. https://en.wikipedia.org/wiki/Cryptographic_hash_function

  23. Omnet++4.1. https://omnetpp.org/

  24. “Grand-st-bernarddeployment,” http://lcav.epfl.ch/cms/lang/en/pid/86035

Download references

Acknowledgment

This work is supported by National Science Foundation of China (No. 61532021, 61772537, 61772536, 61702522), and National Key R & D program of China (No. 2016YFB1000702).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y. et al. (2018). Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds) Database Systems for Advanced Applications. DASFAA 2018. Lecture Notes in Computer Science(), vol 10827. Springer, Cham. https://doi.org/10.1007/978-3-319-91452-7_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91452-7_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91451-0

  • Online ISBN: 978-3-319-91452-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics