Browse > Article
http://dx.doi.org/10.9708/jksci.2012.17.2.119

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks  

Boonsongsrikul, Anuparp (Dept. of Information and Communication, Ajou University)
Park, Seung-Kyu (Dept. of Information and Communication, Ajou University)
Shin, Seung-Hun (Div. of Information and Computer, Ajou University)
Abstract
Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.
Keywords
Sensor Networks; Data Aggregation; Energy Consumption; Data integrity; Monitoring;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 B. Blum, T. He, S. Son, and J. Stankovic, "IGF: A state-free robust communication protocol for wireless sensor networks," Technical Report CS-2003-11, University of Virginia, Charlottesville, VA, 2003.
2 A. D. Wood, L. Fang, J. Stankovic and T. He, "SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks," Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 35-48, 2006
3 J. Deng and Y. S. Han, "Using MDS codes for the key establishment of wireless sensor networks," in LNCS 3794. Berlin, Germany: Springer-Verlag, 2005, pp. 732-744.
4 Q. Dong and D. Liu, "Using auxiliary sensors for pairwise key establishment in WSN," in Proceedings of IFIP International Conference Networks, 2007, pp. 251-262.
5 C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yungand, "Perfectly-secure key distribution for dynamic conferences," Proceedings of Crypto, 1992, pp. 471-486.
6 W. R. Heinzelman A. Ch and H. Balakrishnan, "Energy efficient communication protocol for wireless microsensor networks," Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 3005-3014, 2000.
7 A. Boonsongsrikul, K. Lhee and S. K. Park., "Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator ata AggregatSensor Networks," Journal of Korea Information Procegaing Society, vol. 18-c, No. 5, pp 303-316, 2011.
8 A. Boonsongsrikul, S. K. Park and S. H. Shin., "An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network," Journal of Korea Society of Computer and Information, vol. 16, No. 10, pp. 121-129, 2011.   과학기술학회마을   DOI
9 S. Ozdemir and H. Cam., "Integration of False Data Detection with Data Aggregation and Confidential Transmission in Wireless Sensor Networks," IEEE/ACM Transactions on Networking, Vol.18 No.3, pp. 736-749, 2010.   DOI   ScienceOn
10 A. Boonsongsrikul, K. Lhee and M. Hong, "Securing Data Aggregation against False Data Injection in Wireless Sensor Networks," Proceedings of the 12th International Conference on Advanced Communi cation Technology (ICACT'2010), pp. 29-34, 2010
11 A. De Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz and H. C. Wong, "Decentralized Intrusion Detection in Wireless Sensor Networks," Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16-23, 2005