Secure continuous aggregation in wireless sensor networks pdf

Continuous aggregation is usually required in many sensor applications to obtain. Energy efficient secure data aggregation in wireless sensor network shilparani1 yogita patil2 1,2appa institute of engineering and technology, kalaburgi, karnataka, india abstract wireless sensor network wsn comprises of an expansive number of asset compelled sensor nodes. Energy efficient clustering and secure data aggregation in wireless sensor networks by julia gerda maria albath a dissertation presented to the faculty of the graduate school of the missouri university of science and technology in partial ful llment of the requirements for the degree doctor of philosophy in computer science 2008 approved by. Previous research, current status and future directions article pdf available in wireless personal communications 974. Secure data aggregation in wireless sensor networks abstract. Section 10 concludes the chapter while highlighting some. Privacy preserving innetwork aggregation in wireless sensor networks. Review for secure data aggregation in wireless sensor. A wireless sensor network wsn is a energy and security. Continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of aggregates. These networks have huge application in habitat monitoring, disaster management, security and.

Secure continuous aggregation in wireless sensor networks lei yu, member, ieee, jianzhong li, member, ieee, siyao cheng, shuguang xiong, haiying shen, member, ieee abstractcontinuous aggregation is usually required in many sensor applications to obtain the temporal variation information of aggregates. Osdap optimized and secure data aggregation protocol for. Efficient and optimally secure innetwork aggregation in. Wireless body area network an overview sciencedirect. Energy efficient clustering and secure data aggregation in. It helps the users to understand how the environment changes over time. Secure continuous aggregation in wireless sensor networks. Wireless sensor networks wsns consist of sensor nodes.

Secure data aggregation in wireless sensor networks ieee. Two main security challenges in secure data aggregation are confidentiality and integrity of data. Abstract in this paper, we have proposed a secure data aggregation protocol for wireless sensor networks wsns that is robust to deceitful nodes. In recent years, wireless sensor networks w sns have drawn considerable attention from. If you continue browsing the site, you agree to the use of cookies on this website.

Optimized secure data aggregation in wireless sensor networks. Because with the help of data aggregation we reduce the energy consumption by eliminating redundancy. Our design for data aggregation eliminates redundant sensor. Joseph, jathin jos a secure edtm for wireless sensor network in ijser feb2016 6 patel swapnil secure data aggregation in wireless sensor network. Section 9 presents some simulation results to evaluate the performance of the proposed secure aggregation protocol. Research article mutual defense scheme for secure data.

Robust and secure aggregation of encrypted data in. One way to make an aggregation function robust to outliers is to place up per and lower bounds on the acceptable range of a sensor reading. Directed diffusion dd 2 may be a popular information aggregation paradigm for wireless device networks. In recent years, wireless sensor networks wsns have drawn considerable attention from. Secure and privacyaware data collection in wireless.

Localization techniques in wireless sensor networks. Here, base station secure data aggregation concept in wireless sensor networks queries the network. Security in wireless sensor networks entails many different challenges. Wsns have many research issues that affect design and performance of overall network such as hardware and operating system, medium access schemes, deployment, time synchronization, localization, middleware, wireless sensors and actors networks, transport layer, network layer, quality of service, and network security. Introduction wireless sensor network is a collection of small sized, low cost sensor nodes, which is deployed in physical environment. Pdf secure data aggregation in wireless sensor network. A comprehensive overviewq suat ozdemira, yang xiaob a computer engineering department, gazi university, maltepe, ankara, tr06570, turkey bdepartment of computer science, the university of alabama, tuscaloosa, al 354870290, united states article info article history. Wireless sensor networks wsns, as distributed networks of sensors with the ability to sense, process and communicate, have been increasingly used in various fields including engineering, health and environment, to intelligently monitor remote locations at low cost. Osdap optimized and secure data aggregation protocol for wireless sensor networks. Using aggregation in wireless sensor network reduces the overall communication cost.

Secure and energyefficient data aggregation with malicious aggregator identification in wireless sensor networks. Survey on secure data aggregation for wireless sensor. Secure and privacypreserving data aggregation protocols. Data aggregation in wireless sensor network slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Energy efficient data aggregation in wireless sensor networks. A gamebased secure and energy efficient data aggregation for wireless sensor networks tristandaladierengouang,yunliu,andzhenjiangzhang. If we know that valid sensor readings are usually in the interval l,u, then we can truncate every input to be within this range. We propose a privacy preserving, energyefficient and scalable continuous data aggregation pecda.

Cn model uses the pushpull strategy, when the sensor detects specific events, it will periodically push broadcast the information throughout the network, when user want to get the information, then a pullbased information query will be exploited. Secure encrypteddata aggregation for wireless sensor networks shihi huang. Received 8 july 2008 received in revised form 29 november 2008. A survey on secure data aggregation protocols in wireless. Pdf energy aware load balancing and secure continuous. Addressing the continuous threat of attacks at the aggregator nodes, this work proposes a privacy preserving secure innetwork data aggregation ppsda technique for wireless sensor networks wsns. In wireless sensor networks wsns, combneedlecn model has been used for information discovery. The identification of outliers can be used to filter false data, find faulty nodes and discover.

Secure and energyefficient data aggregation in wireless sensor. Abstractcommunication in wireless sensor networks uses the majority of a sensor s limited energy. Secure hierarchical innetwork aggregation in sensor networks. Wbans must satisfy security and privacy requirements, which depend on the type of application, either medical or nonmedical. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a.

While encryption is traditionally used to provide end to end confidentiality in wireless sensor network, the aggregators in a secure data aggregation scenario need to decrypt the encrypted data to perform aggregation. In the applications of sensor networks, outlier detection has attracted more and more attention. Slogix offers ns2 projects source code for secure continuous aggregation in wireless sensor networks,ns2 simulation for secure continuous aggregation in wsns. However, the existing secure aggregation algorithms focus on snapshot data aggregation, so they are not suitable for continuous data aggregation in view of traffic and energy consumption. Data aggregation in wireless sensor network research india. Introduction wireless sensor nodes that collaborate to form a wireless sensor networks wsns, suffer from severe constraints in power, computational resources, memory and bandwidth 1. Abstract maximum utilization of limited resources energy, bandwidth and memory in wireless sensor networks is a challenge for the researcher community. Secure data aggregation in wireless sensor networks gmu cs. A new approach to secure data aggregation protocol for. Wireless sensor networks wsns rely on in network aggregation for efficiency, that is, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. Pdf secure data aggregation using homomorpic encryption.

Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. Data aggregation, security, resources, wsn keywords wireless sensor network, data aggregation, secure data aggregation 1. In the case of medical applications, security breaches may result in critical harm to patients or even death. An outline of data aggregation security in heterogeneous. However, in a hostile environment, the adversary could fabricate false temporal variation patterns of the aggregates by manipulating a series of aggregation results through compromised nodes. A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. In some applications, queries may be persistent in nature resulting in a continuous. In section 8, a secure aggregation algorithm for wsns is proposed. In a large sensor network, innetwork data aggregation significantly reduces the amount of communication and energy consumption. In this paper, we jointly consider data aggregation, information trust, and fault tolerance to enhance the correctness and trustworthiness of collected information.

Wireless sensor networks are increasingly deployed in security. Privacy preserving innetwork aggregation in wireless sensor. Ns2 simulation for secure continuous aggregation slogix. Pdf in the recent years,wireless sensor network appears as an emerging technology which consists of thousands of small and low cost sensors. Recently, secure in network aggregation in wireless sensor networks becomes a challenge issue, there isan extensive research on this area due to the large number of applications where the sensors. These sensor0nodes impart over wireless medium to play. Privacy preserving secure data aggregation for wireless. Wireless sensor networks wsns have attracted a lot of interest over the last. Request pdf secure continuous aggregation in wireless sensor networks continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of. Secure encrypteddata aggregation for wireless sensor networks. Innetwork aggregation provides an energyefficient way to extract summarization information from sensor networks. Pdf secure data aggregation in wireless sensor networks. Where group of sensor nodes in this paper, we aim to provide an extensive overview of collect information from target region 3.

Abstractin network data aggregation is an essential technique in mission critical wireless sensor networks wsns f or achieving effective transmission and hence better power conservation. Robust and secure aggregation of encrypted data in wireless sensor networks. Pdf secure and energyefficient data aggregation with. Privacypreserving and energyefficient continuous data. Research article mutual defense scheme for secure data aggregation in wireless sensor networks huronghua,dongxiaomei,andwangdaling school of information science and engineering, northeastern university, shenyang, china. Unsupervised outlier detection in sensor networks using. Common security protocols for aggregated wsns are eit her hopbyhop or. Keywords wireless sensor networks, homomorphic encryp tion, data aggregation. For wireless multimedia sensor networks wmsns deployed in noisy and unattended environments, it is necessary to establish a comprehensive framework that protects the accuracy of the gathered multimedia information. Unsupervised outlier detection in sensor networks using aggregation tree springerlink. Secure data aggregation in wireless sensor networks.

1381 725 687 705 684 1347 143 548 842 184 1038 1350 1501 1482 21 289 659 256 1061 320 909 470 132 583 1065 705 1055 454 662 655 1064 210 1294 204 1371 914