Secure data aggregation in wireless sensor networks books

In network aggregation is a natural approach in wireless sensor networks wsns to collaboratively process data generated by the sensor nodes. Secure data aggregation in wireless sensor networks ieee 2012. They employ distributed monitoring schemes to detect misbehaving nodes. Two main security challenges in secure data aggregation are confidentiality and integrity of data. This book provides an overview of the major security issues that various wsn designers have to face, and also gives a comprehensive guide of solutions and open problems. The biggest advantage of building intelligence into a sensor is that the sensor can process data before sending them to a data consumer. Security data aggregation in wireless sensor networks, emerging communications for wireless sensor networks, anna foerster and alexander foerster, intechopen, doi. Secure data aggregation technique in wireless sensor network. Secure and energyefficient data aggregation for wireless sensor networks 31 data aggregation is necessary in order to improve the overall network lifetime that is indeed a fundamental design. Due to the fusion of data items sourced at different nodes into a single one during innetwork processing, the sanctity of the aggregated data needs to be ensured. In many sensor applications, the data collected from individual nodes. Wireless sensor networks consist of tiny senor nodes with limited computing and communicating capabilities and, more importantly, with limited energy resources. Such a multihop scheme demands different nodes to take diverse traffic loads.

Optimized secure data aggregation in wireless sensor networks. Innetwork aggregation is a natural approach in wireless sensor networks wsns to collaboratively process data generated by the sensor nodes. Proceedings of the seventh acm international symposium on mobile ad hoc networking and computing mobihoc 06, pp. The kind of processing that is often needed is to aggregate the data into a more compact representation called. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicateinsensitive algorithms to accurately compute aggregates e. Wireless sensor networks wsns, which can have hundreds or thousands of sensor nodes deployed over a monitored region, are being increasingly used in several applications such as military reconnaissance, target tracking, environmental monitoring, and medical monitoring 1,2,3,4. Especially, the data integrity of the aggregated result is critical as any malicious update to it can jeopardize not one, but. Secure data aggregation with fully homomorphic encryption.

Secure wireless sensor networks threats and solutions. Secure data aggregation in mobile sink wireless sensor. Abstractin a large sensor network, innetwork data aggrega tion significantly. Most of the applications of wireless sensor networks have critical tasks to be fulfilled. In these largescale wireless sensor networks lwsns, the amount of data processed is very large. Security data aggregation in wireless sensor networks. A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. Data aggregation is the process of reducing communication overhead in wireless sensor networks wsns. Secure data aggregation in wireless sensor networks springerlink. In order to reduce the transmission of redundant data and enhance security, this article proposed a secure data aggregation and authentication scheme. In, the authors present an energy efficient and secure pattern based data aggregation espda protocol which considers both data aggregation and security concepts together in clusterbased wireless sensor networks. Threats and solutions targets advancedlevel students and researchers in computer science and electrical engineering as a secondary text book. In addition, the book presents original research on the application of a dynamic wsn to solve the problem of energy consumption in a secure wsn during the process of data aggregation and transmission. Sengottuvelan secure data aggregation technique in wireless sensor network in ijircce oct2015 4 vimal kamal and sanjay madria secure data aggregation in wireless sensor network 5 nefilda k.

In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Proceedings of the ieee conference on computer communications infocom 07, pp. Secure data aggregation research for wireless sensor network. Pdf secure data aggregation in wireless sensor networks. Proceedings of the conference on mobile and ubiquitous systems. We propose an energyefficient and highaccuracy eeha scheme for secure data aggregation in wireless sensor networks. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in largescale wireless sensor networks lwsns. In this field, our interest is in the combinations of secure data aggregation protocols and secure routing protocols. Data aggregation is a widely used technique in wirelss sensor networks. With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of peoples lives.

Secure data aggregation technique in wireless sensor. Part of the studies in computational intelligence book series sci, volume 278. Data aggregation is way of summarizing and combining sensor data. Energy efficient data aggregation in wireless sensor networks. Secure data aggregation in wireless sensor networks ieee.

Investigating approaches of data integrity preservation for. Data communication between nodes in wireless sensor networks consumes a large percentage. He w, liu x, nguyen h, nahrstedt k, abdelzaher t 2007 pda. Data aggregation is the process of data summarizing that has the. Secure data aggregation in wireless sensor networks has two contrasting objectives, i efficiently collecting and aggregating data and ii aggregating the data securely. In this chapter we evaluate the power consumption of publickey algorithms and investigate whether these algorithms can be used within the power constrained sensor nodes. A comprehensive overviewq suat ozdemira, yang xiaob a computer engineering department, gazi university, maltepe, ankara, tr06570, turkey bdepartment of computer science, the university of alabama, tuscaloosa, al 354870290, united states article info article history. Wireless sensor networks frequently consists of a huge number of less expensive radar networks that rigorously partial detecting,computation and communique abilities.

As wireless sensor networks are usually deployed in remote and hostile environments to transmit sensitive information, sensor nodes are prone to node compromise attacks and security issues such as data. Received 8 july 2008 received in revised form 29 november 2008. Energyefficient and highaccuracy secure data aggregation. However, while this continuous data aggregation operation improves the bandwidth and energy utilization, it may negatively affect other performance. Secure data aggregation protocols in wireless sensor networks. Hani alzaid, ernest foo, juan gonzalez neito and donggook park february 7th 2011. Wireless sensor networks wsns typically use innetwork processing to reduce the communication overhead. Secure and energyefficient data aggregation for wireless. This dissertation addresses the security issues in wireless sensor networks, focusing on secure data aggregation and false data detection. Privacy preserving secure data aggregation for wireless. Secure data aggregation protocols in wireless sensor. Wsns measure environmental conditions like temperature, sound, pollution levels, humidity, wind, and so on.

Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. Secure in network aggregation in wireless sensor networks. Secure and privacypreserving data aggregation protocols for. Secure innetwork aggregation in wireless sensor networks. Investigating approaches of data integrity preservation. These are similar to wireless ad hoc networks in the sense that. Informatics and telecommunications engineering book series lnicst, volume 49. In wireless sensor networks, the benefit of data aggregation increases if the intermediate sensor nodes perform data aggregation incrementally when data are being forwarded to the base station. To the best of our knowledge, only the works of wu et al. Secured data aggregation in wireless sensor networks emerald. Secure data aggregation with fully homomorphic encryption in. Secured data aggregation in wireless sensor networks.

Due to the fusion of data items sourced at different nodes into a single one during in network processing, the sanctity of the aggregated data needs to be ensured. In the wireless sensor networkwsn have the hard mission, it prolongs the. Secure data aggregation in wireless sensor networks abstract. In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. In a large sensor network, in network data aggregation significantly reduces the amount of communication and energy consumption. Data aggregation da is the best approach for energy conservation in wireless sensor networks wsn, due to the open deployment, sensors are prone for security threats s. In a large sensor network, innetwork data aggregation significantly reduces the amount of communication and energy consumption. A secure routing protocol for wireless sensor networks. Secure data aggregation in wireless sensor networks article pdf available in ieee transactions on information forensics and security 73. Secure and privacypreserving data aggregation protocols. This study aims to provide a secured data aggregation with reduced energy consumption in wsn. Secure data aggregation and false data detection for wireless.

Sep 14, 20 secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, in network data aggregation significantly reduces the amount of communication and energy consumption. Secure data aggregation in wireless sensor networks wei zhang, ph. Routing in wireless sensor networks chapter 5 principles. Energyefficient and secure patternbased data aggregation protocol 2003. Muthuavinashiappan proposed a protocol espda 6 to provide energyefficient data aggregation together with secure data communication in wireless sensor networks. Professionals working in the wireless sensor networks field will also find this book useful as a reference. Review for secure data aggregation in wireless sensor. Although en route aggregation of reverse multicast traffic improves energy efficiency, it becomes a hindrance to endtoend security.

In a bid to reduce the power consumption during data gathering, cluster heads are elected to. Issues in wireless networks and mobile computing, pp. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. Providing security to aggregate data in wireless sensor networks is known as secure data aggregation in wsn. Secure data aggregation in wireless sensor networks gmu cs. Secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, innetwork data aggregation significantly reduces the amount of. Symmetrickey based homomorphic primitives for endtoend. Wireless sensor network wsn refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location.

Data aggregation is the process of reducing communication. Energyefficient and highaccuracy secure data aggregation in. Survey on several secure data aggregation schemes in wsn. Some wsn applications, such as monitoring patients in hospitals or weapons targeting in battlefront require endtoend data confidentiality. May 22, 2009 yang y, wang x, zhu s, cao g 2006 sdap. Secure data aggregation for multiple queries in wireless. Proceedings of the sixth australasian information security conference aisc 2008. To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed. Secure data aggregation of wireless sensor networks bartleby. Secure data aggregation in wireless sensor networks.

There has been many related work proposed to address these security issues. Espda is the first protocol to consider data aggregation techniques without compromising security. Wireless sensor networks wsns typically use in network processing to reduce the communication overhead. The goal of eeha is that the sensor network can obtain an accurate aggregation result while guaranteeing that no private sensor reading is released to other sensors and that no significant extra overhead is introduced.

Jun 26, 2015 many secure data aggregation protocols have been proposed as well 6,7. Wireless sensor networks are often deployed in open or even hostile environment, its security problem is very prominent, data aggregation is easily to be attacked for security during the specific implementation process. A novel secure data aggregation protocol is proposed to prevent the redundant data transmission from sensor nodes to clusterheads. Secure data aggregation research for wireless sensor. Secured data aggregation in wireless sensor networks dois. To get this project in online or through training sessions, contact. Wireless sensor networks wsn is especially vulnerable against external and internal attacks due to its particular characteristics. Elliptic curve cryptography, in network processing, privacy homomorphism, secure data aggregation, wireless sensor networks wsns. Sep 11, 2014 data aggregation in wireless sensor networks 1. Secure data aggregation in wireless sensor networks sanjeev setiaa,sankardas roy band sushil jajodia a computer science department, george mason university, fairfax, va, usa b center for secure information systems, george mason university abstract. In a bid to reduce the power consumption during data gathering, cluster heads are elected to gather data from every node in the wsn. Wireless sensor network consists of severely energy constrained sensor nodes and are susceptible to security attacks due to broadcast communication model.

Concealed data aggregation protocols aim to preserve the endtoend privacy of sensor readings while performing en route. Cryptography and security in computing 4 topological constraints. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks mohsen rezvani, student member, ieee, aleksandar ignjatovic, elisa bertino, fellow, ieee, and sanjay jha, senior member, ieee abstractdue to limited computational power and energy resources, aggregation of data from multiple sensor nodes done. Wireless sensor networks are now in widespread use to monitor regions, detect events. Energyefficient and secure patternbased data aggregation protocol 6 in espda, author proposed a protocol to provide energyefficient data aggregation together with secure data communication in wireless sensor networks. Secure data aggregation and false data detection for. In these largescale wireless sensor networks lwsns, the amount of data processed is very large and the data. Introduction wireless sensor nodes that collaborate to form a wireless sensor networks wsns, suffer from severe constraints in power, computational resources, memory and bandwidth 1. Tsudik, efficient aggregation of encrypted data in wireless sensor networks, in. Data aggregation is a widely used technique in wireless sensor networks to reduce the power consumed in wsn. We are intechopen, the worlds leading publisher of open access books. In the wireless sensor networkwsn have the hard mission, it prolongs the lifetime of the network, so with the help. Elliptic curve cryptography, innetwork processing, privacy homomorphism, secure data aggregation, wireless sensor networks wsns. Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network.

Our readership spans scientists, professors, researchers, librarians, and. Aug 28, 2015 to get this project in online or through training sessions, contact. The university of texas at arlington, 2008 supervising professor. It is very important to provide a secure routing protocol in order to optimize the security of any data aggregation protocol. Secure data aggregation in wireless sensor networks mathunipd. Due to resource restricted sensor nodes, it is important to minimize the amount of data transmis. Data aggregation in wireless sensor networks jin cui to cite this version. Secure data aggregation survey wireless sensor networks abstract wireless sensor networks often consists of a large number of lowcost sensor nodes that have strictly limited sensing, computation, and communication capabilities. When any compromised node is detected by its neighborhood, a secure routing protocol is launched to choose safe paths to the considered honest data aggregators. Secure data aggregation technique for wireless sensor. To reduce energy consumption, many systems also perform innetwork aggregation of sensor data at intermediate nodes enroute to the base station.

596 852 1475 555 539 523 1241 1099 970 780 296 100 694 489 1188 1310 816 563 1202 1491 12 455 412 182 931 334 1136 1164 1044 1278 699 521 205 1003