Professional Documents
Culture Documents
Keyword: Wireless Sensor Network (WSN), Message Authentication Code (MAC), Energy-
Efficient Secure Data Aggregation Framework (ESDAF).
1. Introduction
1.1. Wireless Sensor Networks
Wireless sensor networks comprises of the upcoming technology that has attained noteworthy
consideration from the research community. Sensor networks comprise of many small, low cost
devices and are naturally self-organizing ad hoc systems. The function of the sensor network is
monitoring the physical environment, collect and transmit the information to other sink nodes. In
general the range of the radio transmission for the sensor networks are in the orders of the
magnitude which is smaller than the geographical extent of the intact network.
Hence, the data has to be transmitted hop-by-hop towards the sink in a multi-hop manner. The
consumption of energy in the network can be reduced if the amount of data to be relayed is
reduced. [1].
Many of the features of the wireless sensor networks give rise to challenging problems
[3]. The most important three characteristics are:
• Sensor nodes are the ones which are prone to maximum failures.
• Sensor nodes make use of the broadcast communication pattern and have severe bandwidth
restraint.
• Sensor nodes have limited amount of resources.
•Data Confidentiality: In particular, the basic security issue is the data confidentiality which
safeguards the transmitted data that is sensitive from passive attacks like eavesdropping. The
importance of the data confidentiality is in the hostile environment, where the wireless
channel is more susceptible to eavesdropping. Even though cryptography has provided
plenty of methods, the operation related to complicated encryption and decryption, like
modular multiplication of large numbers in public key based cryptosystems, uses the
sensor’s power quickly.
• Data Integrity: It prevents the alteration of the final aggregation value by the compromised
source nodes or aggregator nodes. Sensor nodes can be easily compromised due to the
lacking of the expensive tampering-resistant hardware. The otherwise used hardware may
• Hop-by-Hop encrypted data aggregation: In this technique, the encryption of the data is
performed by the sensing nodes and decryption by the aggregator nodes. The aggregator
nodes aggregate the data and again encrypt the aggregation result. At the end, the sink node
on obtaining the final encrypted aggregation result decrypts it.
• End to End encrypted data aggregation: In this technique, the aggregator nodes in between
have no decryption keys and can only perform aggregation on the encrypted data.
2. Related Work
Yingpeng Sang et al [7] have classified the security issues, data confidentiality and integrity in
data aggregation into two cases: hop-by-hop encrypted data aggregation and end-to-end
encrypted data aggregation. They have also proposed two general frameworks for these two
cases respectively. The framework for end-to-end encrypted data aggregation has higher
computation cost on the sensor nodes, but achieves stronger security, in comparison with the
framework for hop-by-hop encrypted data aggregation.
Prakash G.L et al [8] have presented privacy-preserving data aggregation scheme for
additive aggregation functions. The goal of their work is to bridge the gap between collaborative
data collection by wireless sensor networks and data privacy. They have presented simulation
results of their schemes and compared their performance to a typical data aggregation scheme
TAG, where no data privacy protection is provided. Results show the efficacy and efficiency of
their schemes. But, due to the algebraic properties of the polynomials, the communication
overhead increases and becomes more complex.
Tamer AbuHmed et al [9] have presented a dynamic and secure scheme for data
aggregation in WSN. Their proposal scheme includes level-based key derivation, data
aggregation, and a new node join phases. Furthermore, they have done a security analysis for a
related Level-based Key Management (LBKM) scheme proposed by Kim et al. Their analysis
shows that LBKM is insecure for one node compromising and neighbor nodes misbehavior. To
this end, they proposed different levelbased key management scheme for secure data
aggregation. Their scheme is secure and more efficient than LBKM scheme in term of
communication overhead and security. However, the proposed work is operated only in the tree
based structure. Moreover, the overhead is greater in the case of the threshold cryptography.
between collaborative data collection by wireless sensor networks and data privacy. They
assessed the two schemes by privacy-preservation efficacy, communication overhead, and data
aggregation accuracy. Their Simulation results show the efficacy and efficiency of our schemes.
But the bandwidth consumption is increased in the case of their proposed SMART technique.
The verification information is built by the source using the shared key. Verification
information is included with data packet during the transmission. On reception of the packet, the
source is verified by the aggregator using the shared key. In case of failure in the verification,
the packet will be discarded, otherwise it will be forwarded. On reception of the data packet by
the sink, the source will be tested again for its validity. If the validity of the source fails then it
will be discarded. A MAC based authentication code is used in order to maintain the integrity of
the data packet. The sink can detect any changes performed by the aggregator including the
verification information, by checking of the MAC value using its shared key. If the data packet
is found to be modified, then it will be discarded.
The power consumption is reduced in our proposed data aggregation method, along with
the maintenance of the secrecy and privacy. In case of the secrecy, encryption is performed by
each sensor node and this encrypted data is then transmitted to the aggregator. Hence, it will not
be possible for the adversaries to read the data packet.
9. If the MAC is not valid, the aggr is prohibited from further transmissions.
4. Simulation Results
The simulated traffic is FTP with TCP source and sink. The number of sources is varied
from 1 to 4. Table 1 summarizes the simulation parameters used
• Average end-to-end Delay: The end-to-end-delay is averaged over all surviving data
packets from the sources to the destinations.
• Average Packet Delivery Ratio: It is the ratio of the number.of packets received
successfully and the total number of packets transmitted.
Based on Attackers
In our initial experiment, we vary the number of Attackers as 1,2,3,4 and 5.
Attackers Vs Delay
10
8
De
ESDA
lay 6
4 F
ESDAF
2
0
1 2 3 4 5
Attackers
Attackers Vs Energy
6
5
En
4 ESDA
er
3 F
gy ESDAF
2
1
0
1 2 3 4 5
Attackers
Attackers Vs Overhead
50000
Ov
40000
er
he 30000 ESDA
ad 20000 F
ESDAF
10000
0
1 2 3 4 5
Attackers
Figure 2 gives the average end-to-end delay for both the protocols when the number of
nodes is increased. From the figure, it can be seen that the average end-to-end delay of the
proposed ESDAF protocol is less when compared with ESDAF protocols.
Figure 3 presents the packet delivery ratio of both the protocols. Since reliability is
achieved using the link stability, ESDAF achieves good delivery ratio, compared to ESDAF
protocol.
Figure 4 shows the results of energy consumption for both the protocols. From the
results, we can see that ESDAF protocol has less energy consumption than ESDAF protocol,
since it has the energy efficient path.
Figure 5 shows the results of Overhead for both the protocols. From the results, we can
see that ESDAF protocol has less Overhead than ESDAF protocol.
5. Conclusion
In this paper, we have developed a secure data aggregation protocol for wireless sensor networks
which maintains energy efficiency. For data aggregation, the system is grouped such that each
group is headed by an aggregator.
This aggregator acts as a link between the sensor nodes and the sink. During the transmission of
the data, first encryption is performed by the sensor nodes when transferring data to the
aggregator. The aggregator on reception of the data decrypts it using the key and reads it. The
aggregator then determines the MAC value using hash function to check the validity of the
source sensor. If the estimated MAC value is valid then the source is authenticated. Second
encryption is performed by the aggregator when transferring data along with the MAC value to
the sink. Hence integrity of the system is maintained. Due to the double encryption of the data
during data aggregation, adversaries cannot affect the system. Hence the system remains secure
even in the wireless environment. Simulation results show that our proposed protocol has
reduced energy consumption while attaining good packet delivery ratio.
References
[1] Dorottya Vass, Attila Vidacs, “Distributed Data Aggregation with Geographical Routing
in Wireless Sensor Networks”, Pervasive Services, IEEE International Conference on
July 2007.
[2] Jukka Kohonen, “Data Gathering in Sensor Networks”, Helsinki Institute for Information
Technology, Finland. Nov 2004.
[3] Gregory Hartl, Baochun Li, “Loss Inference in Wireless Sensor Networks Based on Data
Aggregation”, IPSN 2004.
[4] Zhenzhen Ye, Alhussein A. Abouzeid and Jing Ai, “Optimal Policies for Distributed
Data Aggregation in Wireless Sensor Networks”, Draft Infocom2007 Paper.
[5] Bhaskar Krishnamachari, Deborah Estrin and Stephen Wicker, “The Impact of Data
Aggregation in Wireless Sensor Networks”, Proceedings of the 22nd International
Conference on Distributed Computing Systems, 2002.
[6] Kai-Wei Fan, Sha Liu, and Prasun Sinha, “Structure-free Data Aggregation in Sensor
Networks”, IEEE Transactions on Mobile Computing, 2007.
[7] Yingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan and Naixue Xiong, “Secure
Data Aggregation inWireless Sensor Networks: A Survey”, Seventh International
Conference on Parallel and Distributed Computing, Applications and Technologies,
2006.
[8] Prakash G L, S H Manjula, K R Venugopal and L M Patnaik, “Secure Data Aggregation
Using Clusters in Sensor Networks”, International Journal of Wireless Networks and
Communications Volume 1, Number 1 (2009), pp. 93–101.
[9] Tamer AbuHmed and DaeHun Nyang, “A Dynamic Level-based Secure Data
Aggregation in Wireless Sensor Network”, Information Security Research Laboratory
Graduate School of IT & Telecommunication InHa University.
[10] Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt andTarek Abdelzaher, “PDA:
Privacypreserving Data Aggregation in Wireless Sensor Networks”, 26th IEEE
International Conference on Computer Communications. IEEE INFOCOM 2007.
[11] Shih-I Huang and Shiuhpyng Shieh, “SEA: Secure Encrypted-Data Aggregation in
Mobile Wireless Sensor Networks”, International Conference on Computational
Intelligence and Security 2007.
[12] Bhoopathy, V. and Parvathi, R.M.S. “Energy Efficient Secure Data Aggregation Protocol
for Wireless Sensor Networks”, European Journal of Scientific Research, Vol. 50, Issue
1, pp.48-58, 2011.
[13] Bhoopathy, V. and Parvathi, R.M.S. “Secure Authentication Technique for Data
Aggregation in Wireless Sensor Networks” Journal of Computer Science, Vol. 8, Issue 2,
pp 232-238, 2012.
[14] Bhoopathy, V. and Parvathi, R.M.S. “Energy Constrained Secure Hierarchical Data
Aggregation in Wireless Sensor Networks” American Journal of Applied Sciences, Vol.
9, Issue 6, pp. 858-864, 2012.
[15] Bhoopathy, V. and Parvathi, R.M.S. “Securing Node Capture Attacks for Hierarchical
Data Aggregation in Wireless Sensor Networks” International Journal of Engineering
Research and Applications, Vol. 2, Issue 2, pp. 458-466, 2012.