Secured and Encrypted Data Aggregation with Message Authentication Code in Wireless Sensor Networks


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


In wireless sensor networks, most of the application requires the transmission of data to base station in a secured manner. The existing techniques necessitate multi-hop forwarding that increases the cost and power utility. Also there is a chance for the malicious nodes to inject the false data during data aggregation and data forwarding. In order to overcome these issues, in this paper, we propose a secured and encrypted data aggregation with message authentication code in wireless sensor network. Initially the aggregator nodes are chosen based on the nodes connectivity. When the data aggregation is in process in the aggregation phase, where the encryption key and the verification key is assigned to the nodes while transmitting to the data aggregator, the MAC is also calculated by aggregator and the monitoring nodes. This helps in verifying the data integrity and false data detection. The monitoring node selection is done by the aggregators. By simulation results, we show that the proposed approach improves the data privacy and also reduces the load and power consumption
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Wireless Sensor Networks (WSN); Data Aggregation; Message Authentication; Power Consumption

Full Text:

PDF


References


G. Padmavathi, D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.

Zhijun Li and Guang Gong, “A Survey on Security in Wireless Sensor Networks”, 2008.

Hani Alzaid, Ernest Foo and Juan Gonzalez Nieto,k “Secure Data Aggregation in Wireless Sensor Network: a survey”, Australasian Information Security Conference in Research and Practice in Information Technology (CRPIT), Vol. 81, 2008.

Prakash G L, Thejaswini M, S H Manjula, K R Venugopal and L M Patnaik, “Secure Data Aggregation Using Clusters in Sensor Networks”, World Academy of Science, Engineering and Technology, 51, 2009.

Baljeet Malhotra, Ioanis Nikolaidis and Mario A. Nascimento, “Aggregation Convergecast Scheduling in Wireless Sensor Networks”, Journal Wireless Networks archive Volume 17 Issue 2, Pages 319-335, February 2011.

A.Bartoli, J. Hern´andez-Serrano, M. Soriano, M. Dohler, A. Kountouris and D. Barthel, “Secure Lossless Aggregation for Smart Grid M2M Networks”, Smart Grid Communications (SmartGridComm), First IEEE International Conference on 4-6 Oct. 2010.

Sanjay Madria and Sriram Chellappan, “Secure Data Aggregation in Sensor Networks”, 2007.

Lu Su, Yan Gao, Yong Yang and Guohong Cao, “Towards Optimal Rate Allocation for Data Aggregation in Wireless Sensor Networks”, MobiHoc Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing Article No. 19, Paris, France, May 16–19, 2011.

Jacques M. Bahi, Christophe Guyeux and Abdallah Makhoul, “Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks”, SENSORCOMM, 4-th Int. Conf. on Sensor Technologies and Applications, Italy, 2010.

Tamer AbuHmed and DaeHun Nyang, “A Dynamic Level-based Secure Data Aggregation in Wireless Sensor Network”, 2009.

Rodrigo Roman and Javier Lopez, “Integrating Wireless Sensor Networks and the Internet: A Security Analysis”, Internet Research, Vol. 19 Iss: 2, pp.246 – 259, 2009.

Jacques M. Bahi, Christophe Guyeux and Abdallah Makhoul, “Secure Data Aggregation in Wireless Sensor Networks Homomorphism versus Watermarking Approach”, ADHOCNETS, 2nd Int. Conf. on Ad Hoc Networks, Canada, 2010.

Suat Ozdemir a and Yang Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive overview”, Elsevier, 2009.

Claude Castelluccia, Inria, Aldar C-F.Chan and Einar Mykletun, “Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks”, ACM Transactions on Sensor Networks, Vol. 5, No. 3, Article 20, May 2009.

Shih-I Huang, Shiuhpyng Shieh and J. D. Tygar, “Secure encrypted-data aggregation for wireless sensor networks”, Science+Business Media, LLC, Springer, 2009.

Suat Ozdemir and Hasan Çam, “Integration of False Data Detection with Data Aggregation and Confidential Transmission in Wireless Sensor Networks”, IEEE/ACM Transactions on networking, VOL. 18, NO. 3, JUNE 2010.

Xiaodong Lin, Rongxing Lu and Xuemin (Sherman) Shen, “MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks”, Wireless Communication Mobile Computing, 843–856, 2010.

Zhijun Li and Guang Gong, “On Data Aggregation with Secure Bloom Filter in Wireless Sensor Networks”, 2010.

HevinRajesh, D. and B. Paramasivan, “ Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks”, Journal of Computer Science, pp 899-907, 2012.

Lu, C., Xiong, H., Liu, Z., An asymmetric encryption algorithm for wireless sensor networks based on elliptic curve cryptosystem, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2290-2297.

Qian, P., Wu, M., Privacy preserving in data aggregation of WSN, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2489-2494.

Network Simulator: http:///www.isi.edu/nsnam/n

Said Ben Alla, Abdellah Ezzati, A Qos-Guaranteed Coverage and Connectivity Preservation Routing Protocol for Heterogeneous Wireless Sensor Network, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.

Reza Mohammadi, Reza Javidan, Adaptive Quiet Time Underwater Wireless MAC: AQT-UWMA, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 236-243.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize