• DocumentCode
    108726
  • Title

    Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker´s Impact

  • Author

    Roy, Sandip ; Conti, Marco ; Setia, Sanjeev ; Jajodia, Sushil

  • Author_Institution
    Comput. & Inf. Sci. Dept., Kansas State Univ., Manhattan, KS, USA
  • Volume
    9
  • Issue
    4
  • fYear
    2014
  • fDate
    Apr-14
  • Firstpage
    681
  • Lastpage
    694
  • Abstract
    Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication overhead and energy consumption. The research community proposed a loss-resilient aggregation framework called synopsis diffusion, which uses duplicate-insensitive algorithms on top of multipath routing schemes to accurately compute aggregates (e.g., predicate count or sum). However, this aggregation framework does not address the problem of false subaggregate values contributed by compromised nodes. This attack may cause large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above attack launched by compromised nodes. In particular, we present an algorithm to enable the base station to securely compute predicate count or sum even in the presence of such an attack. Our attack-resilient computation algorithm computes the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy. Extensive analysis and simulation study show that our algorithm outperforms other existing approaches.
  • Keywords
    telecommunication network routing; telecommunication security; wireless sensor networks; WSN; attackers impact; base station; data aggregation security; energy consumption; fire monitoring; message routing; multipath routing schemes; network data aggregation; perimeter surveillance; root node; synopsis diffusion; urban sensing; volcano monitoring; wireless sensor networks; Aggregates; Algorithm design and analysis; Approximation algorithms; Base stations; Routing; Security; Wireless sensor networks; Data aggregation; attack resilient; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2014.2307197
  • Filename
    6746043