Title :
Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks
Author :
Rafik, Merad Boudia Omar ; Mohammed, Fihri
Author_Institution :
STIC Lab., Univ. of Tlemcen, Tlemcen, Algeria
Abstract :
The detection of false data injection and impersonation attacks is one of the major concern in Wireless Sensor Networks (WSNs). In order to provide security, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at the base station, a detection that can lead to a significant loss of legitimate data. Since the base station is the only place where verification is done, any malicious activities during the data aggregation process can only be detected after the reception of the aggregate, which not only is inefficient but also leads to a considerable data loss rate. In this paper, we present a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on base station for verification. Based on an enhanced and SPA-secure version of Tiny ECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.
Keywords :
public key cryptography; wireless sensor networks; MicaZ motes; SPA-secure version; TelosB motes; Tiny ECC; WSN; base station; data aggregation process; end-to-end privacy; false data injection detection; hop-by-hop verification; impersonation attacks; wireless sensor networks; Aggregates; Algorithm design and analysis; Base stations; Encryption; Wireless sensor networks; Wireless sensor networks; elliptic curve cryptography; homomorphic encryption; total data rejection;
Conference_Titel :
Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on
Conference_Location :
Bejaia
DOI :
10.1109/INDS.2014.21