Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification

Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh

Abstract

Data aggregation in wireless sensor network is implemented to reduce the communication overhead and to reduce bandwidth utilization. Data confidentiality requires the sensor node to transmit the data in a secure manner so that the adversary is unable to read the data or transmit false data even if it compromises some of the sensor nodes or aggregation node. In this paper a distributed aggregation protocol using homomorphic trapdoor permutation is proposed. This protocol distributes the responsibility of key generation , aggregation and verification to different nodes to reduce the overall power consumption of the sensor network. The peer verification scheme is also proposed as a part of the protocol. Peer verification ensures the authentication of the data and sender node in the network, by at least k peer nodes. Security of the proposed protocol is analyzed against passive and active adversary model.

References

  1. Castelluccia, C., Chan, A. C., Mykletun, E., and Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(3):20.
  2. Du, W., Deng, J., Han, Y. S., and Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE, volume 3, pages 1435-1439. IEEE.
  3. Hayashi, R., Okamoto, T., and Tanaka, K. (2004). An rsa family of trap-door permutations with a common domain and its applications. Public Key CryptographyPKC 2004, pages 291-304.
  4. He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. (2007). Pda: Privacy-preserving data aggregation in wireless sensor networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 2045-2053. IEEE.
  5. Hu, L. and Evans, D. (2003). Secure aggregation for wireless networks. In Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on, pages 384-391. IEEE.
  6. Krishnamachari, B., Estrin, D., and Wicker, S. (2002). The impact of data aggregation in wireless sensor networks. In Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on, pages 575-578. IEEE.
  7. Li, X., Chen, D., Li, C., and Wang, L. (2015). Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks. Sensors, 15(7):15952-15973.
  8. Ozdemir, S. and C¬łam, H. (2010). Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking (TON), 18(3):736-749.
  9. Ozdemir, S. and Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12):2022-2037.
  10. Ozdemir, S. and Xiao, Y. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8):1735-1746.
  11. Schmidt-Samoa, K. (2006). A new rabin-type trapdoor permutation equivalent to factoring. Electronic Notes in Theoretical Computer Science, 157(3):79-94.
  12. Westhoff, D., Girao, J., and Acharya, M. (2006). Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. Mobile Computing, IEEE Transactions on, 5(10):1417-1431.
  13. Yang, Y., Wang, X., Zhu, S., and Cao, G. (2008). Sdap: A secure hop-by-hop data aggregation protocol for sensor networks. ACM Transactions on Information and System Security (TISSEC), 11(4):18.
Download


Paper Citation


in Harvard Style

Chatterjee S., Pais A. and Saurabh S. (2016). Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 440-445. DOI: 10.5220/0005991604400445


in Bibtex Style

@conference{secrypt16,
author={Sumanta Chatterjee and Alwyn R. Pais and Sumit Saurabh},
title={Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={440-445},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005991604400445},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification
SN - 978-989-758-196-0
AU - Chatterjee S.
AU - Pais A.
AU - Saurabh S.
PY - 2016
SP - 440
EP - 445
DO - 10.5220/0005991604400445