CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Secure Aggregation of Exact Sum Queries with Integrity Protection for Wireless Sensor Networks

by Heta K. Desai, Devesh C. Jinwala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 15
Year of Publication: 2013
Authors: Heta K. Desai, Devesh C. Jinwala
10.5120/12815-9733

Heta K. Desai, Devesh C. Jinwala . Secure Aggregation of Exact Sum Queries with Integrity Protection for Wireless Sensor Networks. International Journal of Computer Applications. 73, 15 ( July 2013), 9-17. DOI=10.5120/12815-9733

@article{ 10.5120/12815-9733,
author = { Heta K. Desai, Devesh C. Jinwala },
title = { Secure Aggregation of Exact Sum Queries with Integrity Protection for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 15 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number15/12815-9733/ },
doi = { 10.5120/12815-9733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:08.798409+05:30
%A Heta K. Desai
%A Devesh C. Jinwala
%T Secure Aggregation of Exact Sum Queries with Integrity Protection for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 15
%P 9-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The in-network processing consists of data aggregation operations e. g. Summation, averaging, min-max value, variance etc. Data aggregation reduces the number of message transmitted to the Wireless Sensor Network(WSN) by calculating the sub aggregation results at the intermediate nodes. Furthermore the sensor nodes are deployed in open and unsafe environments, so the security of sensed and aggregated data is crucial. This situation necessitates the investigation of the Secure Data Aggregation (SDA) protocol. Many protocols have been proposed concerning finding answers for SUM queries in WSNs but most of them either offer only approximate answers for SUM queries or do not live up to all the security requirements. The focus of the research in this paper is to investigate a SDA protocol which satisfies all the security requirements viz. Confidentiality, Privacy, Authentication, Integrity and Freshness of the query result and also returns the exact answers for SUM queries (as well as their derivatives, e. g. , COUNT, AVG, etc). The protocol applies homomorphic encryption that promises the privacy as well as confidentiality of data sent by sensor nodes with in-network aggregation. The protocol achieves integrity of sensed data by means of secret sharing scheme, message authentication code (MAC) and data diffusion methods. Proposed scheme satisfies all the essential security requirements for secure in-network aggregation. This scheme does not impose extra overhead in communication. Therefore, the scheme is best desirable for resource-restrain WSNs.

References
  1. Jia, Guo. , Jian'an, Fang. , and Xuemin, Chen,2011. Survey on secure data aggregation for wireless sensor networks. In IEEE International Conference on Service Operations, Logistics, and Informatics (SOLI),138-143.
  2. Suat, Ozdemir. , and Yang, Xiao. , "Secure data aggregation in wireless sensor networks: A comprehensive overview",Journals on Computer networks ,Vol. 53, Issue. 12,2022–2037,2009.
  3. Akyildiz, F. , Su, W. , Subramaniam, S. Y. , and Cayirci E. ,"Wireless sensor networks a survey",Journal of Computer Networks,393 – 422,2002.
  4. Ramesh, Rajagopalan. , and Pramod, K. Varshney. ,2006. Data aggregation techniques in sensor networks: A survey. In Communication Surveys Tutorials IEEE, Volume 8, 48–63.
  5. Nath, S. , Yu, H. , and Chan, H. , 2009. Secure outsourced aggregation via one way chains. In Proceedings of ACM SIGMOD International Conference on Management of data, 31-44.
  6. Boppana, R. V. , and Pengjun, Pan. , 2009. A comparison of secure data aggregation schemes for wireless sensor networks. In International Conference on High Performance Computing, 179-188.
  7. Papadopoulos, Stavros. , Kiayias, A. , and Papadias, D. , 2011. Secure and efficient in-network processing of exact SUM queries. In Proceedings of IEEE 27th International Conference on Data Engineering,517-528.
  8. Chien-Ming, Chen. , Yue-Hsun, Lin. , Ya-Ching, Lin. , and Hung-Min, Sun. , 2012. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. In IEEE Transactions On Parallel And Distributed Systems, Volume 23,727-734.
  9. Zhu, Liehuang. , and Li, Meng. ,2011. An Energy Efficient and Integrity-Preserving Aggregation Protocol in Wireless Sensor Networks. In Performance Computing and Communications Conference IEEE 30th International, 1-6.
  10. Mlaih, Esam. , and Aly, Salah A. ,2008. Secure Hop-by-Hop Aggregation of End-to-End Concealed Data. In IEEE Wireless Sensor Networks INFOCOM Workshops, 1-6.
  11. Przydatek, Bartosz. , Song, Dawn, and Perrig, Adrian. , 2003. SIA: Secure Information Aggregation in Sensor Networks. In ACM Proceedings of the 1st international conference on Embedded networked sensor systems, 255 – 265.
  12. Jadia, P. , and Mathuria, A. , 2004. Efficient secure aggregation in sensor networks. In High Performance Computing, 40-49.
  13. Xiaoyan, Wang. , Jie, Li. , Xiaoning, Peng. , and Beiji, Zou. , 2011. Secure And Efficient Data Aggregation For Wireless Sensor Networks. In IEEE Seventh vehicular Technology Conference Fall , 1-5.
  14. Lingxuan, Hu. , and David, Evans. , 2003. Secure Aggregation for Wireless Networks. In ACM Proceedings of theSymposium on Applications and the Internet Workshops, 384-391.
  15. Ozdemir, Suat. , 2007. Secure and reliable data aggregation for wireless sensor networks. In ACM Proceedings of the 4th international conference on Ubiquitous computing systems, 102-109.
  16. Poornima, A. , and S. ,Amberker, B. , 2010. SEEDA: Secure End-to-End data Aggregation in Wireless sensor networks. In IEEE Seventh International Conference on Wireless and Optical Communication Network, 1-5.
  17. Castelluccia, C. , Mykletyn, E. , and Tsudik, G. , 2005. Efficient aggregation of encrypted data in wireless sensor networks. In the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services MOBIQUITOUS, 109-117.
  18. Bagaa, M. , Lasla, N. , Ouadjaout, A. , and Challal, Y. , 2007. SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. In IEEE Conference on Local Computer Networks, 1053-1060.
  19. Mahimkar, A. , 2004. SecureDav: A secure data aggregation and verification protocol for sensor networks. In Proceedings of the IEEE Global Telecommunications Conference, 2175-2179.
  20. Wenliang, Du. , Jing, Deng. , Yunghsiang, S. Han. , and Pramod, K. Varshney. , 2003. A witness based approach for data fusion assurance in wireless sensor networks. In Proceedings of the IEEE Global Telecommunications Conference, 1435-1439.
  21. Ozdemir, Suat. ,". Functional reputation based reliable data aggregation and transmission for wireless sensor networks",Journal of Computer Communications, November, Volume 31, Issue 17, 3941-3953,2008.
  22. Yi, Yang. , Xinran, Wang. , Sencun, Zhu. , and Guohong, Cao. ,2006. SDAP: A secure hop-by-Hop data aggregation protocol for sensor networks. In Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '06), 356-367.
  23. Rabindra, Bista. , Kyoung-Jin, Jo. , and Jae-Woo, Chang. ,2009. A new approach to secure aggregation of private data in wireless sensor networks. In Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, 394–399.
  24. Kui, Wu. , Dennis, Dreef. , Bo, Sun. , and Yang, Xiao. ,"Secure data aggregation without persistent cryptographic operations in wireless sensor networks",Journal of Security Issues in Sensor and Ad Hoc Networks, Volume 5, Issue 1, 100-111,2007.
  25. The AES-CMAC Algorithm, [Online] Available :http://tools. ietf. org/html/rfc4493.
  26. Alberola, R de Paz. , and Pesch, D. , 2008. AvroraZ: extending Avrora with an IEEE 802. 15. 4 compliant radio chip model. In Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 43-50.
  27. Titzer, B. L. , Lee, D. K. ,and Palsberg, J. , 2005. Avrora: Scalable sensor network simulation with precise timing. In Fourth International Symposium on Information Processing in Sensor Networks, Article No. 67.
  28. Abduvaliev, A. , Sungyoung, Lee. , and Young-Koo, Lee. , 2009. Simple hash based message authentication scheme for wireless sensor networks. In 9th International Symposium on Communications and Information Technology,
Index Terms

Computer Science
Information Sciences

Keywords

Security Wireless Sensor Networks Secure Data Aggregation.