Secure data aggregation in wireless sensor networks bookmark

A heuristic for maximizing the lifetime of data aggregation in. A survey on secure data aggregation in wireless sensor. Jun 26, 2015 many secure data aggregation protocols have been proposed as well 6,7. May 22, 2009 yang y, wang x, zhu s, cao g 2006 sdap. Our design for data aggregation eliminates redundant sensor. Due to resource restricted sensor nodes, it is important to minimize the amount of data transmis. Secure data aggregation survey wireless sensor networks abstract wireless sensor networks often consists of a large number of lowcost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Filtering out the attackers impact article pdf available in ieee transactions on information forensics and security 94. Data aggregation da is the best approach for energy conservation in wireless sensor networks wsn, due to the open deployment, sensors are prone for security threats s. There are some welldesigned secure data aggregation schemes, which understandably have different tradeoffs and are suitable for particular operations. Secure data aggregation technique for wireless sensor. Osdap optimized and secure data aggregation protocol for wireless sensor networks. Secure data aggregation with fully homomorphic encryption in. Covering a wide range of applications, wireless sensor networks wsns can play an important role in iot by seamless integration among.

Two main security challenges in secure data aggregation are confidentiality and integrity of data. Energyefficient and highaccuracy secure data aggregation in. Secure data aggregation with fully homomorphic encryption. However, while this continuous data aggregation operation improves the bandwidth and energy utilization, it may negatively affect other performance. Secure data aggregation in wireless sensor networks ieee. Security in wireless sensor networks wireless sensor network wsn is an emerging technology that shows great promise for various futuristic applications both for mass public. A secure routing protocol for wireless sensor networks. Secure data aggregation protocols in wireless sensor.

Secure and privacypreserving data aggregation protocols for. Analysis of secure innetwork aggregation for anomaly detection in wireless sensor networks arthi. He w, liu x, nguyen h, nahrstedt k, abdelzaher t 2007 pda. Proceedings of the seventh acm international symposium on mobile ad hoc networking and computing mobihoc 06, pp. View secure data aggregation in wsn from cse 1 at psg college of technology. In these largescale wireless sensor networks lwsns, the amount of data processed is very large. This chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks wsn.

They employ distributed monitoring schemes to detect misbehaving nodes. When any compromised node is detected by its neighborhood, a secure routing protocol is launched to choose safe paths to the considered honest data aggregators. Credible secure data aggregation in wireless sensor networks. Pdf secure data aggregation in wireless sensor networks. Secure data aggregation in wireless sensor network. Secure data aggregation in wireless sensor networks using. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in largescale wireless sensor networks lwsns. Secure data aggregation in wireless sensor network using. Abstract maximum utilization of limited resources energy, bandwidth and memory in wireless sensor networks is a challenge for the researcher community.

Proceedings of the ieee conference on computer communications infocom 07, pp. Mar 06, 2012 this chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks wsn. Directed diffusion dd 2 may be a popular information aggregation paradigm for wireless device networks. A trustbased secure data aggregation protocol for wireless. Secure in network aggregation in wireless sensor networks is a necessary and challenging task. Secure data aggregation in wsn secure data aggregation. With the rapid increase in number of sensing devices for healthcare. Secure and efficient verification for data aggregation in wireless. Data aggregation, trust model, wireless sensor network. Secure data aggregation technique in wireless sensor. Analysis of secure innetwork aggregation for anomaly. A secure data aggregation framework for wireless sensor. There is a growing interest in using wireless sensor technologies in various internet of things scenarios. These are similar to wireless ad hoc networks in the sense that.

Introduction wireless sensor networks are increasingly deployed in securitycritical applications such as factory monitoring, environmental monitoring, burglar alarms and. To get this project in online or through training sessions, contact. Introduction the wireless sensor network is defined as the highly distributed networks of small, lightweight wireless node, deployed in large numbers to trust the environment or system by the measurement of physical parameters. Data aggregation routing protocols in wireless sensor networks. Security in wireless sensor networks wireless sensor network wsn is an emerging technology that shows great promise for various futuristic applications both for mass public and military. Privacy preserving secure data aggregation for wireless. Wireless sensor network could not deploy the hostile and uncontrolled environment. It identifies a security vulnerability in the cpda. Providing security to aggregate data in wireless sensor networks is known as secure data aggregation in wsn. There has been extensive work on data aggregation schemes in sensor networks, the aim of data. Analysis of secure in network aggregation for anomaly detection in wireless sensor networks arthi. Secure data aggregation in wireless sensor networks.

Wireless sensor network wsn, aggregation, secure data aggregation protocol sdap. Proceedings of the sixth australasian information security conference aisc 2008. A challenge to data aggregation is how to secure aggregated data from disclosing during. Secure innetwork aggregation in wireless sensor networks is.

Secure data aggregation in wireless sensor networks ieee 2012. Survey on several secure data aggregation schemes in wsn. In the wireless sensor networkwsn have the hard mission, it prolongs the lifetime of the network, so with the help. Energyefficient and privacypreserving spatial range aggregation. Energyefficient and secure patternbased data aggregation protocol 2003. To the best of our knowledge, only the works of wu et al. Another scheme for data aggregation is espda energyefficient and secure pattern based data aggregation for wireless sensor networks 10. In a wireless sensor network wsn, aggregation exploits the correlation between spatially and temporally proximate sensor data to reduce. In wsns, the basic function of sensor networks includes collaborative sensing, sampling, computing, broadcasting sensed information. Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. Wireless sensor network wsn refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. In this field, our interest is in the combinations of secure data aggregation protocols and secure routing protocols. Secure data aggregation for wireless sensor networks using. Data aggregation is a widely used technique in wirelss sensor networks.

In data aggregation, designated motes will collect and the data packets from their surrounding nodes then forward them tothe base station making a huge impact on the traffic as well as on the communication time. Secure data aggregation research for wireless sensor. A new approach to secure data aggregation protocol for. Secure data aggregation in wsn secure data aggregation in. In many sensor applications, the data collected from individual nodes. Data aggregation is way of summarizing and combining sensor data. Abstract in this paper, we have proposed a secure data aggregation protocol for wireless sensor networks wsns that is robust to deceitful nodes. Wsns measure environmental conditions like temperature, sound, pollution levels, humidity, wind, and so on. An constructive for secure data aggregation protocol in. Data aggregation in wireless sensor networks jin cui to cite this version.

Energyefficient and secure patternbased data aggregation protocol 6 in espda, author proposed a protocol to provide energyefficient data aggregation together with secure data communication in wireless sensor networks. So data aggregation becomes a crucial when the wireless sensor network is deployed in remote environment or hostile environment where sensors are prone to node failure and compromises. Sep 14, 20 secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, in network data aggregation significantly reduces the amount of communication and energy consumption. It is very important to provide a secure routing protocol in order to optimize the security of any data aggregation protocol. In the wireless sensor networkwsn have the hard mission, it prolongs the. Secure encrypteddata aggregation for wireless sensor networks. A survey on secure data aggregation scheme for wireless. Fogassisted secure healthcare data aggregation scheme in iot. Wireless sensor networks data aggregation consists on reducing the flow of communication and optimizing the energy consumption. Secure data aggregation in wireless sensor networks wei zhang, ph. A survey on data aggregation techniques in iot sensor networks. Secure data aggregation in wireless sensor networks sanjeev setiaa,sankardas roy band sushil jajodia a computer science department, george mason university, fairfax, va, usa b center for secure information systems, george mason university abstract.

Secure aggregation, sensor networks, data aggregation 1. In wireless sensor networks, the benefit of data aggregation increases if the intermediate sensor nodes perform data aggregation incrementally when data are being forwarded to the base station. Secure data aggregation model sdam in wireless sensor. Energyefficient and highaccuracy secure data aggregation. We propose an energyefficient and highaccuracy eeha scheme for secure data aggregation in wireless sensor networks. In this paper, the proposed secure data aggregation schemes. On data aggregation with secure bloom filter in wireless.

Secure encrypteddata aggregation for wireless sensor networks shihi huang. Routing in wireless sensor network wsn aims to interconnect sensor nodes via single or multihop paths. Advances in intelligent systems and computing, vol 324. It is important in hostile environments where the wireless channel is vulnerable to eavesdropping. Because sensor node has limited battery power so data aggregation techniques have been proposed for wireless sensor networks. In order to reduce the transmission of redundant data and enhance security, this article proposed a secure data aggregation and authentication scheme. Wireless sensor networks wsns are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. It presents a comprehensive state of the art discussion on the various privacy protection mechanisms used in wsns and particularly focuses on the cpda protocols proposed by he et al. Recently, many researchers have studied efficiently gathering data in wireless sensor networks to minimize the total energy. If multiple sensor nodes send the same pattern code to the clusterhead. Secure hierarchical innetwork aggregation in sensor networks. Secure and privacypreserving data aggregation protocols. Secure data aggregation protocols in wireless sensor networks. Some works 712 studied security of data aggregate in wsn.

Wireless sensor networks are always deployed in remote and hostile. Wireless sensor networks wsns, which can have hundreds or thousands of sensor nodes deployed over a monitored region, are being increasingly used in several applications such as military reconnaissance, target tracking, environmental monitoring, and medical monitoring 1,2,3,4. Introduction wireless sensor nodes that collaborate to form a wireless sensor networks wsns, suffer from severe constraints in power, computational resources, memory and bandwidth 1. Secure data aggregation in wsn a wireless sensor network wsn typically consists of a sink node sometimes referred to as. Secure data aggregation for wireless sensor networks using double cluster head approach. Secure data aggregation research for wireless sensor network. The sensor nodes for these applications are typically deployed in unsecured locations and are. Introduction wireless sensor networks are usually consists of hundreds or thousands of inexpensive and lowpowered sensing devices. There has been many related work proposed to address these security issues. Secure data aggregation technique in wireless sensor network. An important feature of a wsn is datacentricity, and the nodes of the. A1 pg scholar, department of ece, sns college of technology, chennai anna university, tamil nadu, india1 abstract. The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. Osdap optimized and secure data aggregation protocol for.

In this paper, we propose a secure data aggregation protocol which. The goal of eeha is that the sensor network can obtain an accurate aggregation result while guaranteeing that no private sensor reading is released to other sensors and that no significant extra overhead is introduced. Aug 28, 2015 to get this project in online or through training sessions, contact. A trustbased secure data aggregation protocol for wireless sensor networks 9 1.

Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks mohsen rezvani, student member, ieee, aleksandar ignjatovic, elisa bertino, fellow, ieee, and sanjay jha, senior member, ieee abstractdue to limited computational power and energy resources, aggregation of data from multiple sensor nodes done. An effective and secure data aggregation technique for. Elliptic curve cryptography, innetwork processing, privacy homomorphism, secure data aggregation, wireless sensor networks wsns. A balance privacypreserving data aggregation model in wireless. Wireless sensor networks are often deployed in open or even hostile environment, its security problem is very prominent, data aggregation is easily to be attacked for security during the specific implementation process. Elliptic curve cryptography, in network processing, privacy homomorphism, secure data aggregation, wireless sensor networks wsns. In espda, clusterhead first requests sensor nodes to send the corresponding pattern code for the sensed data.

Volume 5, issue 8, february 2016 content security using. Early secure data aggregation schemes were hop by hop schemes, these schemes like the one by hu and evans 8 mostly dealt with the issue of data confidentiality in the face of a single. Query privacy preserving for data aggregation in wireless sensor. Secure data aggregation schemes are fruitful to achieve the security in wireless sensor networks. The university of texas at arlington, 2008 supervising professor. Data aggregation is the process of data summarizing that has the. Secure data aggregation in wireless sensor networks ieee 2012 ns2 in a large sensor network, innetwork data aggregation significantly reduces the amount of.

880 291 333 475 120 801 642 722 547 756 133 1085 959 357 64 1360 92 1153 1203 371 335 909 965 708 303 627 28 296 1245 1220 590