Secure data aggregation in wireless sensor networks article pdf available in ieee transactions on information forensics and security 73. Periodic data sampling leads to enormous collection of raw facts, the transmission of which would rapidly deplete the sensor power. Secure hierarchical innetwork aggregation in sensor networks. The impact of data aggregation in wireless sensor networks abstract sensor networks are distributed eventbased systems that differ from traditional communication networks in several ways. The issue of when nodes should report their data is considered in the context of.
That assumption obviously reduces the ratio of packet transmission in the wsn. Data routing innetwork aggregation for wireless sensor. Therefore, the design of an efficient data aggregation protocol is an inherently challenging task because the protocol designer must trade off between energy efficiency, data accuracy, faulttolerance, latency, and security. Therefore, such data aggregation protocols must decrypt the sensor data to perform data aggregation and encrypt the aggregated data before transmitting it. Directed diffusion dd 2 may be a popular information aggregation paradigm for wireless device networks. Wireless sensor network wsn refers to a group of spatially dispersed and dedicated sensors.
Secure data aggregation model sdam in wireless sensor. Given the application area, network resource constraints, and the fact that local computation often consumes signi. Manets have high degree of mobility, while sensor networks are mostly stationary. Data aggregation in wireless sensor networks halinria. Volume 5, issue 8, february 2016 content security using. Thus, it provides a simple, declarative interface for data collection and aggregation. Pdf secured data aggregation in wireless sensor networks. Privacy and robustness for data aggregation in wireless. In wireless sensor networks, a compromised sensor node can inject false data during data forwarding and aggregation to forge the integrity of aggregated data. Review for secure data aggregation in wireless sensor networks shweta rana, prof. These are similar to wireless ad hoc networks in the sense that. Energy efficient data aggregation in wireless sensor networks. Wireless sensor networks are often deployed in open or even hostile environment, its security problem is very prominent, data aggregation is easily to be attacked for security during the specific implementation process.
Hopbyhop data aggregation and endto end data aggregation are two methods used for secure data aggregation 1 in wireless sensor networks. Wsn nodes have less power, computation and communication compared to manet nodes. Secure and efficient verification for data aggregation in wireless. In this paper, we have performed data aggregation on the basis of entropy of the sensors. Thirumaraiselvan apece content introduction literature survey problem formulation objective proposed work tools required references introduction literature survey k. Innetwork aggregation techniques for wireless sensor. Secure data aggregation research for wireless sensor.
They play a vital role in military surveillance, environment monitoring etc. Secure data aggregation technique in wireless sensor. Secure continuous aggregation in wireless sensor networks lei yu, member, ieee, jianzhong li, member, ieee, siyao cheng, shuguang xiong, haiying shen, member, ieee abstract continuous aggregation is usually required in many sensor applications to obtain. In this, data is encrypted by the sensing nodes and decrypted by the aggregator nodes then aggregate the data and encrypt the aggregation result again. Simulation results prove that the proposed algorithms reduce the data traffic and at the same time also improve the network lifetime. We consider a problem of minimum cost energy data aggregation in wireless sensor networks computing certain functions of sensed data. Data aggregation is a widely used technique in wireless sensor networks. A context aware wireless body area network ban pdf. The impact of data aggregation in wireless sensor networks. In this chapter, however, we focus on an important class of insider attacks in which the adversary uses compromised nodes to inject malicious data into the network within the framework of a data aggregation system. In wireless sensor network, data aggregation is the process of aggregation data from different sensor node by using aggregation techniques such as max, min, avg, count, sum as in 4 etc. The first algorithm for provably secure hierarchical innetwork data aggregation. These techniques allow to trade off communication for computational complexity. Wireless sensor networks consist of sensor nodes with sensing and communication capabilities.
Secure and privacypreserving data aggregation protocols. This paper investigates the relationship between security and data aggregation. Fault tolerant aggregation in sensor networks using corrective actions, ieee communications society conference on sensor, mesh and ad hoc communications. Data aggregation can also eliminate redundancy, minimize the number of transmissions and thus save the energy. We use innetwork aggregation such that data can be combined at the intermediate nodes en route to the sink.
Wireless sensor network wsn refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. Purpose this study aims to provide a secured data aggregation with reduced energy consumption in wsn. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes privacy. Innetwork data aggregation is the global process of gathering and routing information through a multihop network, processing data at the intermediate nodes by reducing resource consumption and increasinging the network lifetime. Data aggregation, an essential paradigm for wireless routing in sensor networks aim to combine the data coming from different sources. Data aggregation in wireless sensor networks jin cui to cite this version. Proceedings of the sixth australasian information security conference aisc 2008. An effective and secure data aggregation technique for.
Secure data aggregation in wireless sensor networks. A data fusion method in wireless sensor networks ncbi. Wireless sensor network could not deploy the hostile and uncontrolled environment. Secure data aggregation technique for wireless sensor. In data aggregation, designated motes will collect and the data packets from their surrounding nodes then forward them tothe base station making a huge impact on the traffic as well as on the communication time. In order to reduce the transmission of redundant data and enhance security, this article proposed a secure data aggregation and authentication scheme.
Manet wireless sensor networks may be considered a subset of mobile adhoc networks manet. Hierarchical concealed data aggregation for wireless. Secure data aggregation techniques for wireless sensor. Data aggregation is the process of one or several sensors then collects the detection result from other sensor. A heuristic for maximizing the lifetime of data aggregation in. Secure data aggregation protocols in wireless sensor networks. Presently, securing data aggregation is an important research issue in wsns due to. Secure continuous aggregation in wireless sensor networks. However, while this continuous data aggregation operation improves the bandwidth and energy utilization, it may negatively affect other per. Secure data aggregation schemes are fruitful to achieve the security in wireless sensor networks. It is highly desirable for sensor nodes to detect and drop false data as soon as possible in order to avoid depleting their limited resources such as battery power and bandwidth 49. Wireless sensor networks are randomly deployed and responsible for monitoring wide geographical area.
Networking and services mobiquitous, boston, 2004, pp. Wireless sensor networks wsns are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. Unstructured topology in wsn results in large amount of redundant data being. The university of texas at arlington, 2008 supervising professor. Another clusterbased data aggregation scheme is discussed. Filtering out the attackers impact article pdf available in ieee transactions on information forensics and security 94.
The idea is to combine the data coming from different sources enroute eliminating redundancy, minimizing the number of transmissions and thus saving energy. The biggest advantage of building intelligence into a sensor is that the sensor can process data before sending them to a data consumer. The scheme jointly optimizes the data aggregation and routing. Covering a wide range of applications, wireless sensor networks wsns can play an important role in iot by seamless integration among.
Secure data aggregation in wireless sensor networks wei zhang, ph. Performance of data aggregation for wireless sensor networks. Issue in data aggregation is that the data may be passed. Wsns measure environmental conditions like temperature, sound, pollution levels, humidity, wind, and so on. In particular, we discuss the vulnerabilities of existing data. The sensor nodes for these applications are typically deployed in unsecured locations and are. Performance evaluation of data aggregation for cluster. Secured data aggregation in wireless sensor networks. Vasilakos department of electrical and computer engineering national technical university of athens, greece email. There has been extensive work on data aggregation schemes in sensor networks, the aim of data. In this paper, the proposed secure data aggregation schemes.
Data aggregation has been put forward as an essential paradigm for wireless routing in sensor networks 3, 6. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is. Impact of data aggregation in wireless sensor networks. Wireless sensor networks also are used for the collection of data for monitoring of. Secure data aggregation in wireless sensor network. Abstractwireless sensor networks wsns are increasingly used in several applications, such as volcano and.
In recent years, the main challenge was to develop energy e. In addition, it intelligently distributes and executes aggregation queries in the sensor network in a time and powerefficient way, and is sensitive to the resource constraints and lossy communication properties of wireless sensor networks. Secure and efficient hierarchical data aggregation in. Abstract this thesis focuses on three fundamental issues that concern data aggregation protocols for periodic data collection in sensor networks. Secure aggregation, sensor networks, data aggregation 1. The entropy is computed from the proposed local and global. A survey on secure data aggregation protocols in wireless. Wireless sensor networks data aggregation consists on reducing the flow of communication and optimizing the energy consumption. Wireless sensor networks wsn are made up of energy constraint tiny sensing devices which are distributed geographically to monitor inhabited remote areas by collecting the physical phenomenon like temperature, pressure etc. Data aggregation in typical wireless sensor networks, sensor nodes are usually resourceconstrained and batterylimited. Data coming from multiple sensor nodes are aggregated as. Data communication between nodes in wireless sensor networks consumes a large percentage.
Innetwork data aggregation is main technique supported by wireless sensor networks. Data aggregation in cluster based wireless sensor networks. Mid semester presentation seminari on data aggregation in wireless sensor network presented by shiwangi yadav m. Review for secure data aggregation in wireless sensor. Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks wsns. We focus on data aggregation problems in energy constrained. So data aggregation becomes a crucial when the wireless sensor network is deployed in remote environment or hostile environment where sensors are prone to node failure and compromises. In wireless sensor network, data fusion is considered an essential process for preserving sensor energy. In order to save resources and energy, data must be aggregated to avoid overwhelming amounts of traffic in the network. Minimum cost data aggregation for wireless sensor networks. Introduction wireless sensor networks are increasingly deployed in securitycritical applications such as factory monitoring, environmental monitoring, burglar alarms and.
This paradigm shifts the focus from the traditional addresscentricap. Pdf secure data aggregation in wireless sensor networks. The kind of processing that is often needed is to aggregate the data into a more compact representation called. Secured data aggregation in wireless sensor networks dois. Secure data aggregation in wireless sensor networks sanjeev setiaa,sankardas roy band sushil jajodia a computer science department, george mason university, fairfax, va, usa b center for secure information systems, george mason university abstract. An aggregation framework on wireless sensor networks is proposed 2.
71 736 266 241 1478 696 445 1498 833 332 1053 467 1535 1236 63 440 1405 1489 402 676 1553 1382 502 180 33 520 369 441 1219 996 431 440 901 520 190 1136 559 230 1276 726 1334