• DocumentCode
    74989
  • Title

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

  • Author

    Rezvani, Mohsen ; Ignjatovic, Aleksandar ; Bertino, Elisa ; Jha, Somesh

  • Author_Institution
    Sch. of Comput. Sci. & Eng., Univ. of New South Wales, Sydney, NSW, Australia
  • Volume
    12
  • Issue
    1
  • fYear
    2015
  • fDate
    Jan.-Feb. 1 2015
  • Firstpage
    98
  • Lastpage
    110
  • Abstract
    Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance of very low power processors dramatically improves, future aggregator nodes will be capable of performing more sophisticated data aggregation algorithms, thus making WSN less vulnerable. Iterative filtering algorithms hold great promise for such a purpose. Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources, usually in a form of corresponding weight factors assigned to data provided by each source. In this paper we demonstrate that several existing iterative filtering algorithms, while significantly more robust against collusion attacks than the simple averaging methods, are nevertheless susceptive to a novel sophisticated collusion attack we introduce. To address this security issue, we propose an improvement for iterative filtering techniques by providing an initial approximation for such algorithms which makes them not only collusion robust, but also more accurate and faster converging.
  • Keywords
    iterative methods; telecommunication security; wireless sensor networks; aggregating node; collusion attacks; computational power; data trustworthiness; energy resources; iterative filtering algorithms; multiple-sensor nodes; node compromising attacks; secure data aggregation technique; sensor node reputation; simple averaging method; trust assessment; very-low-power processors; weight factors; wireless sensor networks; Wireless sensor networks; collusion attacks; robust data aggregation;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2014.2316816
  • Filename
    6786996