Ecole d'ingénieur et centre de recherche en Sciences du numérique

Confidentiality and integrity for data aggregation in WSN using peer monitoring

Di Pietro, Roberto; Michiardi, Pietro; Molva, Refik

Security and Communication Networks, Vol 2, N°2, March/April 2009, Security in Wireless Sensor Networks

Hop-by-hop data aggregation is a very important technique used to reduce the communication overhead and energy expenditure of sensor nodes during the process of data collection in a Wireless Sensor Network (WSN). However, the unattended nature of WSNs calls for data aggregation techniques to be secure. Indeed, sensor nodes can be compromised to mislead the base station by injecting bogus data into the network during both forwarding and aggregation of data. Moreover, data aggregation might increase the risk of confidentiality violations: If sensors close to the base station are corrupted, an adversary could easily access to the results of the "in network" computation performed by the WSN. Further, nodes can also fail due to random and non-malicious causes (e.g. battery exhaustion), hence availability should be considered as well. In this paper we tackle the above issues that affect data aggregation techniques by proposing a mechanism that: i) provides both confidentiality and integrity of the aggregated data so that for any compromised sensor in the WSN the information acquired could only reveal the readings performed by a small, constant number of neighboring sensors of the compromised one; ii) detects bogus data injection attempts; iii) provides high resilience to sensor failures. Our protocol is based on the concept of delayed aggregation and peer monitoring and requires local interactions only. Hence, it is highly scalable and introduces small overhead; detailed analysis supports our findings.

Document Doi Bibtex

Titre:Confidentiality and integrity for data aggregation in WSN using peer monitoring
Mots Clés:wireless sensor networks, secure data aggregation, bogus data injection attack, node failure, peer monitoring, resilience
Type:Journal
Langue:English
Ville:
Date:
Département:Sécurité numérique
Eurecom ref:2623
Copyright: © Wiley. Personal use of this material is permitted. The definitive version of this paper was published in Security and Communication Networks, Vol 2, N°2, March/April 2009, Security in Wireless Sensor Networks and is available at : http://dx.doi.org/10.1002/sec.93
Bibtex: @article{EURECOM+2623, doi = {http://dx.doi.org/10.1002/sec.93}, year = {2009}, month = {01}, title = {{C}onfidentiality and integrity for data aggregation in {WSN} using peer monitoring}, author = {{D}i {P}ietro, {R}oberto and {M}ichiardi, {P}ietro and {M}olva, {R}efik}, journal = {{S}ecurity and {C}ommunication {N}etworks, {V}ol 2, {N}°2, {M}arch/{A}pril 2009, {S}ecurity in {W}ireless {S}ensor {N}etworks}, url = {http://www.eurecom.fr/publication/2623} }
Voir aussi: