Data Aggregation Security Challenge in Wireless Sensor Networks
@article{Labraoui2011DataAS, title={Data Aggregation Security Challenge in Wireless Sensor Networks}, author={Nabila Labraoui and Abdelhak Mourad Gu{\'e}roui and Makhlouf Aliouat and Tanveer A. Zia}, journal={Ad Hoc Sens. Wirel. Networks}, year={2011}, volume={12}, pages={295-324} }
Data aggregation in wireless sensor networks (WSN) is a rapidly emerging research area. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However, securing data aggregation in WSN is made even more challenging, by the fact that the sensor nodes and aggregators deployed in hostile environments are exposed to various security threats. In this paper, we survey the current research related to security in data aggregation…
16 Citations
Adaptive security level for data aggregation in Wireless Sensor Networks
- Computer ScienceIEEE 5th International Symposium on Wireless Pervasive Computing 2010
- 2010
This work introduces a novel secure data aggregation framework for Wireless Sensor Networks. It ensures the accuracy of data aggregation value without neglecting energy efficiency, even if all…
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
- Computer ScienceTelecommun. Syst.
- 2013
A framework that enhances availability with efficiency close to that of in-network aggregation avoiding over-reliance on sensors and a two hierarchical levels of monitoring to ensure the integrity and the accuracy of aggregate result, only when necessary, i.e. only when malicious activities are detected.
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
- Computer ScienceJ. Univers. Comput. Sci.
- 2011
RAHIM is presented, a reactive defense to secure data aggregation scheme in cluster-based wireless sensor networks based on a novel application of adaptive hierarchical level of monitoring providing accuracy of data aggregation result in lightweight manner, even if all aggregator nodes and a part of sensors are compromised in the network.
A reliable trust management scheme in wireless sensor networks
- Computer Science2015 12th International Symposium on Programming and Systems (ISPS)
- 2015
This paper presents a Trust Model based on Risk evaluation (TMR) to effectively deal with conflicting behaviors of malicious nodes and shows how risk factor evaluation can make the trust model more reliable because it becomes more sensitive to on-off attack.
Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation
- Computer Science2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)
- 2018
A novel algorithm known as Efficient-CSDA (Consensus based data aggregation) algorithm, which allows the neighbouring node to detect the dishonest nodes is presented and comparison between two algorithms clearly shows that the algorithm outperforms the existing one.
Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks
- Computer ScienceDICTAP
- 2011
A Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure and is effective in detecting and defending against wormhole attacks with a high detection rate.
Secure range-free localization scheme in Wireless sensor networks
- Computer Science2011 10th International Symposium on Programming and Systems
- 2011
A Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure and it is shown that the solution is effective in detecting and defending against wormhole attacks with a high detection rate.
Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks
- Computer ScienceTrans. Emerg. Telecommun. Technol.
- 2012
The main idea of the approach is to plug in a proactive countermeasure to the basic DV‐Hop scheme called Infection prevention, which is effective in detecting and defending against wormhole attacks with a high detection rate.
A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks
- Computer ScienceWirel. Pers. Commun.
- 2016
A Risk-aware Reputation-based Trust (RaRTrust) model for WSNs that uses both reputation and risk to evaluate trustworthiness of a sensor node, which is robust to on–off attack and differ from other trust models based only on reputation.
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks
- Computer ScienceIEEE Transactions on Parallel and Distributed Systems
- 2012
This work designs two efficient aggregation schemes for a wireless sensor network of n randomly placed sensors, and theoretically proves that their protocol achieves the optimal tradeoffs, and derives the optimal aggregation throughput depending on a given threshold value on gathering efficiency.
References
SHOWING 1-10 OF 83 REFERENCES
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
- Computer Science2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies
- 2008
A Reputation-based Secure Data Aggregation for WSNs (RSDA) that integrates aggregation functionality with the advantages provided by a reputation system to enhance the network lifetime and the accuracy of the aggregated data.
SRDA: secure reference-based data aggregation protocol for wireless sensor networks
- Computer ScienceIEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
- 2004
Simulation results show that the proposed protocol yields significant savings in energy consumption while preserving data security, and also establishes secure connectivity among sensor nodes without any online key distribution.
Security support for in-network processing in Wireless Sensor Networks
- Computer ScienceSASN '03
- 2003
This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes.
SIA: secure information aggregation in sensor networks
- Computer ScienceSenSys '03
- 2003
This paper is the first on secure information aggregation in sensor networks that can handle a malicious aggregator and sensor nodes, and presents efficient protocols for secure computation of the median and the average of the measurements, for the estimation of the network size, and for finding the minimum and maximum sensor reading.
Securing wireless sensor networks against aggregator compromises
- Computer ScienceIEEE Communications Magazine
- 2008
By applying three schemes to secure data aggregation that rely on multipath routing, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.
Secure and Reliable Data Aggregation for Wireless Sensor Networks
- Computer ScienceUCS
- 2007
Simulation results show that the proposed protocol improves the security and reliability of aggregated data significantly.
A security framework for wireless sensor networks
- Computer ScienceProceedings of the 2006 IEEE Sensors Applications Symposium, 2006.
- 2006
In this paper, a security framework is introduced to address the special security needs of tiny sensor nodes and sensor networks as a whole and focuses on three areas: cluster formation, secure key management scheme, and a secure routing algorithm.
Secure Aggregation in Sensor Networks Using Neighborhood Watch
- Computer Science2007 IEEE International Conference on Communications
- 2007
This paper studies stealth attacks where an adversary seeks to deceive the system without being detected, and proposes several measures to make a sensor network resilient to attack, including mutual monitoring and constraint validation, randomized delivery trees, and redundancy in the data supplied by the network.
Resilient aggregation in sensor networks
- Computer ScienceSASN '04
- 2004
This paper examines several approaches for making these aggregation schemes more resilient against certain attacks, and proposes a mathematical framework for formally evaluating their security.
Secure aggregation for wireless networks
- Computer Science2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
- 2003
This work presents a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises, and takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.