Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks

verfasst von : Mukesh Kumar, Kamlesh Dutta

Erschienen in: Intelligent Computing, Communication and Devices

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Achieving security in case of data aggregation in wireless sensor network (WSN) is a challenging task because of its limitations in terms of computation, resources, battery power, transmission capabilities, etc. This paper provides a comprehensive discussion on literature of security concerns in data aggregation in WSNs. Main contributions of this paper are describing the fundamentals of secure data aggregation in WSN, identifying the important parameters for the classification of secure data aggregation techniques for WSN, considering key characteristics of existing secure data aggregation techniques, comparing the existing secure data aggregation techniques, and introducing table of comparison based on various parameters such as security principles, prevention of attacks by protocols, aggregation function, and cryptographic techniques used.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pathan, A.-S.K., Islam, H.K., Sayeed, S.A., Ahmed, F., Hong, C.S.: A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. Appeared in IEEE ICNEWS (2006) Pathan, A.-S.K., Islam, H.K., Sayeed, S.A., Ahmed, F., Hong, C.S.: A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. Appeared in IEEE ICNEWS (2006)
2.
Zurück zum Zitat Chan, H., Perrig, A.: Security and privacy in sensor networks. Carnegie Mellon University, pp. 99–101 Chan, H., Perrig, A.: Security and privacy in sensor networks. Carnegie Mellon University, pp. 99–101
3.
Zurück zum Zitat Welsh, M., Myung, D., Gaynor, M., Moulton, S.: Resuscitation monitoring with a wireless sensor network. In: Supplement to Circulation. J. Am. Heart Assoc. (2003) Welsh, M., Myung, D., Gaynor, M., Moulton, S.: Resuscitation monitoring with a wireless sensor network. In: Supplement to Circulation. J. Am. Heart Assoc. (2003)
4.
Zurück zum Zitat Mainwaring, A., Polastre, J., Szewczyk, R., Culler, R.: Wireless sensor networks for habitat monitoring. In: First ACM International Workshop on Wireless Sensor Networks and Applications (2002) Mainwaring, A., Polastre, J., Szewczyk, R., Culler, R.: Wireless sensor networks for habitat monitoring. In: First ACM International Workshop on Wireless Sensor Networks and Applications (2002)
5.
Zurück zum Zitat Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: First European Workshop on Wireless Sensor Networks (EWSN’04) (2004) Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: First European Workshop on Wireless Sensor Networks (EWSN’04) (2004)
6.
Zurück zum Zitat Duckworth, G.L., Gilbert, D.C., Barger, J.E.: Acoustic counter-sniper system. In: SPIE International symposium on Enabling Technologies for Law Enforcement and Security (1996) Duckworth, G.L., Gilbert, D.C., Barger, J.E.: Acoustic counter-sniper system. In: SPIE International symposium on Enabling Technologies for Law Enforcement and Security (1996)
7.
Zurück zum Zitat Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based counter sniper system. In: Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD (2004) Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based counter sniper system. In: Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD (2004)
8.
Zurück zum Zitat Castillo-Effen, M., Quintela, D.H., Jordan, R., Westhoff, W., Moreno, W.: Wireless sensor networks for flash-flood alerting. In: Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits, and Systems, Dominican Republic (2004) Castillo-Effen, M., Quintela, D.H., Jordan, R., Westhoff, W., Moreno, W.: Wireless sensor networks for flash-flood alerting. In: Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits, and Systems, Dominican Republic (2004)
9.
Zurück zum Zitat Gao, T., Greenspan, D., Welsh, M., Juang, R.R., Alm, A.: Vital signs monitoring and patient tracking over a wireless network. In: Proceedings of the 27th IEEE EMBS Annual International Conference (2005) Gao, T., Greenspan, D., Welsh, M., Juang, R.R., Alm, A.: Vital signs monitoring and patient tracking over a wireless network. In: Proceedings of the 27th IEEE EMBS Annual International Conference (2005)
10.
Zurück zum Zitat Lorincz, K., Malan, D., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S.: Sensor networks for emergency response: challenges and opportunities. In: Pervasive Computing for First Response (Special Issue), IEEE Pervasive Computing (2004) Lorincz, K., Malan, D., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S.: Sensor networks for emergency response: challenges and opportunities. In: Pervasive Computing for First Response (Special Issue), IEEE Pervasive Computing (2004)
11.
Zurück zum Zitat Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy efficient sensor networks. University of Twente, EA Enshede, Netherlands (2002) Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy efficient sensor networks. University of Twente, EA Enshede, Netherlands (2002)
12.
Zurück zum Zitat Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless communication (2007) Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless communication (2007)
13.
Zurück zum Zitat Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL (2003) Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL (2003)
14.
Zurück zum Zitat Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the ACM MOBIHOC’06, New York, USA, pp. 356–367 (2006) Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the ACM MOBIHOC’06, New York, USA, pp. 356–367 (2006)
15.
Zurück zum Zitat S. Ozdemir.: Secure and reliable data aggregation for wireless sensor networks. LNCS, volume 4836, pp. 102–109 (2007) S. Ozdemir.: Secure and reliable data aggregation for wireless sensor networks. LNCS, volume 4836, pp. 102–109 (2007)
16.
Zurück zum Zitat Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5(10), 1417–1431(2006) Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5(10), 1417–1431(2006)
17.
Zurück zum Zitat Sun, H.M., Lin, Y.H., Hsiao, Y.C., Chen, C.M.: An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. In: Proceedings of ICESS08, pp. 19–26 (2008) Sun, H.M., Lin, Y.H., Hsiao, Y.C., Chen, C.M.: An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. In: Proceedings of ICESS08, pp. 19–26 (2008)
18.
Zurück zum Zitat Castellucia, C., Chan, C.F., Mykletum, E., Tsudik, G.: Efficiently provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5(3) (2009) Castellucia, C., Chan, C.F., Mykletum, E., Tsudik, G.: Efficiently provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5(3) (2009)
19.
Zurück zum Zitat Ozdemir, S.: Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In: Proceedings of the ICPS’07: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007) Ozdemir, S.: Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In: Proceedings of the ICPS’07: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007)
20.
Zurück zum Zitat Bahi, J.M., Guyeux, C., Makhoul, A.: Efficient and robust secure aggregation of encrypted data in sensor networks. In: proceedings of Fourth International Conference on Sensor Technologies and Applications, pp. 472–477 (2010) Bahi, J.M., Guyeux, C., Makhoul, A.: Efficient and robust secure aggregation of encrypted data in sensor networks. In: proceedings of Fourth International Conference on Sensor Technologies and Applications, pp. 472–477 (2010)
21.
Zurück zum Zitat Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), pp. 1435–1439 (2003) Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), pp. 1435–1439 (2003)
22.
Zurück zum Zitat Ozdemir, S., Çam, H.: Integration of false data detection with data aggregation and confidential transmission in WSN. IEEE/ACM Trans. Netw. 18(3) (2010) Ozdemir, S., Çam, H.: Integration of false data detection with data aggregation and confidential transmission in WSN. IEEE/ACM Trans. Netw. 18(3) (2010)
23.
Zurück zum Zitat Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34, 591–597 (2011)CrossRef Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34, 591–597 (2011)CrossRef
24.
Zurück zum Zitat Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011). ElsevierCrossRef Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011). ElsevierCrossRef
25.
Zurück zum Zitat Ozdemir, S., Xiao, Y.: FTDA: outlier detection based fault tolerant data aggregation for WSN. In: Security and Communication Networks (2012) Ozdemir, S., Xiao, Y.: FTDA: outlier detection based fault tolerant data aggregation for WSN. In: Security and Communication Networks (2012)
26.
Zurück zum Zitat Roy, S., Setia, S., Jajodia, S.: Secure data aggregation in WSN. IEEE Trans. Inf. Forensics 7(3), 1040–1052 (2012)CrossRef Roy, S., Setia, S., Jajodia, S.: Secure data aggregation in WSN. IEEE Trans. Inf. Forensics 7(3), 1040–1052 (2012)CrossRef
27.
Zurück zum Zitat Chen, C.M., Lin, Y.H.: SASHIMI: Secure aggregation via successively hierarchical inspecting of message integrity on WSN. J. Inf. Hiding Multimedia Signal Process. 4(1) (2013) Chen, C.M., Lin, Y.H.: SASHIMI: Secure aggregation via successively hierarchical inspecting of message integrity on WSN. J. Inf. Hiding Multimedia Signal Process. 4(1) (2013)
28.
Zurück zum Zitat Hur, J., Lee, Y., Hong, S., Yoon, H.: Trust-based secure aggregation in wireless sensor networks. In: Proceedings: The 3rd International Conference on Computing, Communications and Control Technologies: CCCT (2005) Hur, J., Lee, Y., Hong, S., Yoon, H.: Trust-based secure aggregation in wireless sensor networks. In: Proceedings: The 3rd International Conference on Computing, Communications and Control Technologies: CCCT (2005)
29.
Zurück zum Zitat Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proceedings IEEE SECON’06 (2006) Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proceedings IEEE SECON’06 (2006)
30.
Zurück zum Zitat Perez-Toro, C.R., Panta, R.K., Bagchi, S.: Reputation based resilient data aggregation. In: Proceedings of IEEE SECON (2010) Perez-Toro, C.R., Panta, R.K., Bagchi, S.: Reputation based resilient data aggregation. In: Proceedings of IEEE SECON (2010)
31.
Zurück zum Zitat Farooq, M.U.: Computational intelligence based data aggregation technique for WSN. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, 24–26 Oct, San Francisco, USA (2012) Farooq, M.U.: Computational intelligence based data aggregation technique for WSN. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, 24–26 Oct, San Francisco, USA (2012)
32.
Zurück zum Zitat Bahanfar, S., Kousha, H., Darougaran, L.: Neural network for error detection and data aggregation in WSN. IJCSI 8(5–3) (2011) Bahanfar, S., Kousha, H., Darougaran, L.: Neural network for error detection and data aggregation in WSN. IJCSI 8(5–3) (2011)
33.
Zurück zum Zitat Hevin Rajesh, D., Paramasivan, B.: Fuzzy based secure data aggregation technique in WSN. J. Comput. Sci. 8(6), 899–907 (2012)CrossRef Hevin Rajesh, D., Paramasivan, B.: Fuzzy based secure data aggregation technique in WSN. J. Comput. Sci. 8(6), 899–907 (2012)CrossRef
Metadaten
Titel
A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks
verfasst von
Mukesh Kumar
Kamlesh Dutta
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2009-1_1

Premium Partner