Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2011.18C.5.303

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks  

Anuparp, Boonsongsrikul (아주대학교 정보통신공학과)
Lhee, Kyung-Suk (아주대학교 정보컴퓨터공학부)
Park, Seung-Kyu (아주대학교 정보통신대학)
Abstract
Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.
Keywords
Wireless Sensor Networks; Data Aggregation; Security; False Data Injection; Energy Consumption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Boonsongsrikul and et al., "Securing Data Aggregation against False Data Injection attacks in Wireless Sensor Networks," ICACT 2010, pp.29-34, 2010.
2 H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Network," IEEE INFOCOM 2005, pp.524-535, 2005.
3 H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," Proc. of IEEE Symposium on Security and Privacy, May, 2003.
4 H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Transactions on Dependable and Secure Computing, Vol.2, No.3, pp.233-247, July-Sept., 2005.   DOI   ScienceOn
5 Da Silva and et al., "Decentralized Intrusion Detection in Wireless Sensor Networks," Q2SWinet '05, pp.16-23, 2005.   DOI
6 S. Zou and et al., "ENCAST: EnergyCritical Node Aware Spanning Tree for Sensor Networks," CNSR, pp.249-254, 2005.
7 L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in CCS '02: Proc. of the 9th ACM conference on Computer and Communications Security, pp.41-47, 2002.
8 E. Mlaih and et al., "Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks," IEEE INFOCOM, pp.1-6, 2008.
9 W. R. Heinzelman and et al., "Energy efficient communication protocol for wireless microsensor networks," Proc. of the 33rd Hawaii Int. Conf. on System Sciences, pp.3005-3014, 2000.
10 S. Madden and et al., "TAG: aTiny AGgregation service for ad-hoc sensor networks," OSDI'02, 2002, pp.1-16, 2002.   DOI
11 A. Perrig, R. and et al., "SPINS: security protocols for sensor networks," ACM SIGMOBILE, pp.189-199, 2001.
12 H. Vu and et al., "THIS: THreshold security for Information aggregation in Sensor networks," ITNG'07, pp.89-95, 2007.
13 B. Przydatek and et al., "SIA: Secure information Aggregation in Sensor Networks," SenSys' 03, pp.255-265, 2003.   DOI
14 J. R. Taylor, An Introduction to Error Analysis. 2nd edition. Sausolito, California: University Science Books. 1997.
15 The Network Simulator-ns-2 [Online], Available: http://www.isi.edu/nsnam/ns/
16 Y. Yang and et al, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," MobiHoc'06, pp. 356-367, 2006.   DOI