Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks ☆

作者: Hongjuan Li , Keqiu Li , Wenyu Qu , Ivan Stojmenovic

DOI: 10.1016/J.FUTURE.2013.12.021

关键词:

摘要: Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong network lifetime. However, an adversary may compromise some nodes, use them forge false values as result. Previous secure data schemes have tackled this problem from different angles. The goal of those algorithms ensure that Base Station (BS) does not accept any forged results. But none tried detect nodes inject into bogus Moreover, most usually a (at best) logarithmic per node. In paper, we propose energy-efficient scheme can malicious with constant node overhead. our solution, all results are signed private keys aggregators so they cannot be altered by others. Nodes on each link additionally their pairwise shared key for communications. Each receives its parent (sent parent) siblings (via node), verifies result Theoretical analysis energy consumption accords comparison based simulation study over random trees.

参考文章(28)
M. K. Sandhya, K. Murugan, Secure Data Aggregation in Wireless Sensor Networks Using Privacy Homomorphism international conference on computer science and information technology. pp. 482- 490 ,(2011) , 10.1007/978-3-642-17878-8_49
Ralph C. Merkle, A Certified Digital Signature international cryptology conference. pp. 218- 238 ,(1989) , 10.1007/0-387-34805-0_21
Min Ding, Dechang Chen, Kai Xing, Xiuzhen Chen, Localized fault-tolerant event boundary detection in sensor networks international conference on computer communications. ,vol. 2, pp. 902- 913 ,(2005) , 10.1109/INFCOM.2005.1498320
Wensheng Zhang, Guohong Cao, Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach international conference on computer communications. ,vol. 1, pp. 503- 514 ,(2005) , 10.1109/INFCOM.2005.1497918
B. Parno, A. Perrig, V. Gligor, Distributed detection of node replication attacks in sensor networks ieee symposium on security and privacy. pp. 49- 63 ,(2005) , 10.1109/SP.2005.8
Bartosz Przydatek, Dawn Song, Adrian Perrig, SIA: secure information aggregation in sensor networks international conference on embedded networked sensor systems. pp. 255- 265 ,(2003) , 10.1145/958491.958521
Victor J. Yohai, Ruben H. Zamar, High Breakdown-Point Estimates of Regression by Means of the Minimization of an Efficient Scale Journal of the American Statistical Association. ,vol. 83, pp. 406- 413 ,(1988) , 10.1080/01621459.1988.10478611
Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar, Next century challenges: scalable coordination in sensor networks acm/ieee international conference on mobile computing and networking. pp. 263- 270 ,(1999) , 10.1145/313451.313556
Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, Secure Data Aggregation in Wireless Sensor Networks IEEE Transactions on Information Forensics and Security. ,vol. 7, pp. 1040- 1052 ,(2012) , 10.1109/TIFS.2012.2189568
David E Tyler, Robust Statistics: Theory and Methods Journal of the American Statistical Association. ,vol. 103, pp. 888- 889 ,(2008) , 10.1198/JASA.2008.S239