Skip to main content
Top

2018 | OriginalPaper | Chapter

Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks

Authors : Ying Liu, Hui Peng, Yuncheng Wu, Juru Zeng, Hong Chen, Ke Wang, Weiling Lai, Cuiping Li

Published in: Database Systems for Advanced Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, wireless sensor networks (WSNs) have become a useful tool for environmental monitoring and information collection due to their strong sensory ability. Whereas WSNs utilize wireless communication and is usually deployed in an outdoors environment, which make them vulnerable to be attacked and then lead to the privacy disclosure of the monitored environment. SUM, as one common query among the queries of WSNs, is important to acquire a high-level understanding of the monitored environment and establish the basis for other advanced queries. In this paper, we present a secure hash-based privacy preservation mechanism called HP2M, which not only preserves the privacy of the monitored environment during SUM aggregation query, but also could achieve exact SUM aggregation. Furthermore, an integrity verification mechanism is proposed to verify the integrity of SUM aggregation result, which could alarm the system once data packets transmitted through the networks are modified. One main characteristic of HP2M and the proposed integrity verification mechanism is that they are lightweight with a small bandwidth consumption. Finally, some numerical experiments are performed to demonstrate the efficiency of our proposed approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, C., Lin, M., Lin, W.: Designing and implementing a lightweight WSN MAC protocol for smart home networking applications. J. Circ. Syst. Comput. 26(03), 1–20 (2017)CrossRef Chen, C., Lin, M., Lin, W.: Designing and implementing a lightweight WSN MAC protocol for smart home networking applications. J. Circ. Syst. Comput. 26(03), 1–20 (2017)CrossRef
2.
go back to reference Yang, Z.P., Huang, Q.Z., Wang, M.: Study on application of wireless sensor networks in military highway transportation battlefield environment. Equip. Environ. Eng. 11(03), 78–82 (2014) Yang, Z.P., Huang, Q.Z., Wang, M.: Study on application of wireless sensor networks in military highway transportation battlefield environment. Equip. Environ. Eng. 11(03), 78–82 (2014)
3.
go back to reference Ramadan, R., Elfouly, F., Mahmoud, M., Dessouky, M.: Efficient data reporting in a single and multi-object tracking using WSNs. In: IEEE Symposium Series on Computational Intelligence (2015) Ramadan, R., Elfouly, F., Mahmoud, M., Dessouky, M.: Efficient data reporting in a single and multi-object tracking using WSNs. In: IEEE Symposium Series on Computational Intelligence (2015)
4.
go back to reference Badescu, A.M., Cotofana, L.: A wireless sensor network to monitor and protect tigers in the wild. Ecol. Ind. 57, 447–451 (2015)CrossRef Badescu, A.M., Cotofana, L.: A wireless sensor network to monitor and protect tigers in the wild. Ecol. Ind. 57, 447–451 (2015)CrossRef
5.
go back to reference Lupu, T.-G., Rudas, I., Demiralp, M., Mastorakis, N.: Main types of attacks in wireless sensor networks. In: WSEAS Proceedings International Conference on Recent Advances in Computer Engineering, no. 9 (2009) Lupu, T.-G., Rudas, I., Demiralp, M., Mastorakis, N.: Main types of attacks in wireless sensor networks. In: WSEAS Proceedings International Conference on Recent Advances in Computer Engineering, no. 9 (2009)
6.
go back to reference Ali, A.W., et al.: Energy efficieny in routing protocol and data collection approaches for WSN: a survey. In: 2015 International Conference on Computing, Communication and Automation (ICCCA), pp. 540–545 (2015) Ali, A.W., et al.: Energy efficieny in routing protocol and data collection approaches for WSN: a survey. In: 2015 International Conference on Computing, Communication and Automation (ICCCA), pp. 540–545 (2015)
7.
go back to reference Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: a survey. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 315–320 (2006) Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: a survey. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 315–320 (2006)
8.
go back to reference Morell, A., Correa, A., Barcelo, M., Vicario, J.L.: Data aggregation and principal component analysis in WSNs. IEEE Trans. Wirel. Commun. 15(6), 3908–3919 (2016)CrossRef Morell, A., Correa, A., Barcelo, M., Vicario, J.L.: Data aggregation and principal component analysis in WSNs. IEEE Trans. Wirel. Commun. 15(6), 3908–3919 (2016)CrossRef
9.
go back to reference YongJian, F., Hong, C., Ying, Z.X.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1131–1146 (2012)MathSciNetCrossRef YongJian, F., Hong, C., Ying, Z.X.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1131–1146 (2012)MathSciNetCrossRef
10.
go back to reference He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007) He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007)
11.
go back to reference He, W., Nguyen, H., Liu, X., Nahrstedt, K.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Military Communications Conference, MILCOM 2008, pp. 1–7 (2008) He, W., Nguyen, H., Liu, X., Nahrstedt, K.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Military Communications Conference, MILCOM 2008, pp. 1–7 (2008)
12.
go back to reference Li, C., Liu, Y.: ESMART: energy-efficient slice-mix-aggregate for wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(2), 1–9 (2013) Li, C., Liu, Y.: ESMART: energy-efficient slice-mix-aggregate for wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(2), 1–9 (2013)
13.
go back to reference Papadopoulos, S., Kiayias, A., Papadias, D.: Secure and efficient in-network processing of exact SUM queries. In: IEEE International Conference on Data Engineering, pp. 517–528 (2011) Papadopoulos, S., Kiayias, A., Papadias, D.: Secure and efficient in-network processing of exact SUM queries. In: IEEE International Conference on Data Engineering, pp. 517–528 (2011)
14.
go back to reference Desai, H.K., Jinwala, D.C.: Secure aggregation of exact sum queries with integrity protection for wireless sensor networks. Int. J. Comput. Appl. 73(15), 9–17 (2013) Desai, H.K., Jinwala, D.C.: Secure aggregation of exact sum queries with integrity protection for wireless sensor networks. Int. J. Comput. Appl. 73(15), 9–17 (2013)
15.
go back to reference Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings of IEEE INFOCOM, pp. 2024–2032 (2011) Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings of IEEE INFOCOM, pp. 2024–2032 (2011)
16.
go back to reference Chen, W., Yu, L., Gao, D.: A privacy preserving histogram aggregation algorithm with integrity verification support. Chin. J. Electron. 42(11), 2268–2272 (2014) Chen, W., Yu, L., Gao, D.: A privacy preserving histogram aggregation algorithm with integrity verification support. Chin. J. Electron. 42(11), 2268–2272 (2014)
17.
go back to reference Pavithra, M.N., Chinnaswamy, C.N., Sreenivas, T.H.: Privacy preservation scheme for WSNs using signature and trust value computation. Int. J. Eng. Tech. Res. 5(6), 50–53 (2016) Pavithra, M.N., Chinnaswamy, C.N., Sreenivas, T.H.: Privacy preservation scheme for WSNs using signature and trust value computation. Int. J. Eng. Tech. Res. 5(6), 50–53 (2016)
19.
go back to reference Al-Riyami, A., Zhang, N., Keane, J.: An adaptive early node compromise detection scheme for hierarchical WSNs. IEEE Access 4, 4183–4206 (2016)CrossRef Al-Riyami, A., Zhang, N., Keane, J.: An adaptive early node compromise detection scheme for hierarchical WSNs. IEEE Access 4, 4183–4206 (2016)CrossRef
20.
go back to reference Nath, S., Yu, H., Chan, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June–July 2009, pp. 31–44 (2009) Nath, S., Yu, H., Chan, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June–July 2009, pp. 31–44 (2009)
21.
go back to reference Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Symposium on Operating Systems Design and Implementation Copyright Restrictions Prevent ACM From Being Able To Make the Pdfs for This Conference Available for Downloading, pp. 131–146 (2002)CrossRef Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Symposium on Operating Systems Design and Implementation Copyright Restrictions Prevent ACM From Being Able To Make the Pdfs for This Conference Available for Downloading, pp. 131–146 (2002)CrossRef
Metadata
Title
Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks
Authors
Ying Liu
Hui Peng
Yuncheng Wu
Juru Zeng
Hong Chen
Ke Wang
Weiling Lai
Cuiping Li
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-91452-7_46

Premium Partner