Secure data aggregation using access control and authentication for wireless sensor networks

作者: Abdul Razaque , Syed S. Rizvi

DOI: 10.1016/J.COSE.2017.07.001

关键词:

摘要: Abstract The existing secure data aggregation approaches for wireless sensor networks were not designed authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce the using access control authentication (SDAACA) protocol. Using protocol, aim detect sinkhole Sybil attacks that are difficult by cryptographic approaches. proposed SDAACA protocol consists of two novel algorithms: fragmentation (SDF) node joining authorization (NJA). SDF algorithm hides from adversary fragmenting it into small pieces. NJA algorithm, an process is initiated before allowing any new join network. Both algorithms help improve Quality Service (QoS) parameters. Moreover, propose scheme supports accuracy, efficiency, freshness reducing communication overhead guaranteeing authenticity process. Furthermore, mapped on oil-refinery plant prevent both in presence static mobile nodes. Finally, show effectiveness our through extensive simulations a comparative study other known protocols.

参考文章(37)
Xing Li, Dexin Chen, Chunyan Li, Liangmin Wang, Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks Sensors. ,vol. 15, pp. 15952- 15973 ,(2015) , 10.3390/S150715952
N. Chandra Sekar, V. Vaidehi, R. Kayalvizhi, Secure data aggregation in wireless sensor networks international conference on computing for sustainable global development. pp. 2179- 2184 ,(2015)
Yi Zhang, Lina Zhu, Li Feng, Key Management and Authentication in Ad Hoc Network based on Mobile Agent Journal of Networks. ,vol. 4, pp. 487- 494 ,(2009) , 10.4304/JNW.4.6.487-494
Taochun Wang, Xiaolin Qin, Liang Liu, An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks International Journal of Distributed Sensor Networks. ,vol. 9, pp. 843485- ,(2013) , 10.1155/2013/843485
N. O. Tippenhauer, L. Malisa, A. Ranganathan, S. Capkun, On Limitations of Friendly Jamming for Confidentiality ieee symposium on security and privacy. pp. 160- 173 ,(2013) , 10.1109/SP.2013.21
Abdul Razaque, Khaled Elleithy, Least Distance Smart Neighboring Search (LDSNS) over Wireless Sensor Networks (WSNs) 2013 European Modelling Symposium. pp. 549- 554 ,(2013) , 10.1109/EMS.2013.91
Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Hani Alzaid, None, Secure data aggregation in wireless sensor networks 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). pp. 55- 58 ,(2013) , 10.1109/MEDHOCNET.2013.6767410
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar, Secure encrypted-data aggregation for wireless sensor networks Wireless Networks. ,vol. 16, pp. 915- 927 ,(2010) , 10.1007/S11276-009-0177-Y
Suat Ozdemir, Yang Xiao, Integrity protecting hierarchical concealed data aggregation for wireless sensor networks Computer Networks. ,vol. 55, pp. 1735- 1746 ,(2011) , 10.1016/J.COMNET.2011.01.006