• Corpus ID: 2463461

Data Aggregation Security Challenge in Wireless Sensor Networks

@article{Labraoui2011DataAS,
  title={Data Aggregation Security Challenge in Wireless Sensor Networks},
  author={Nabila Labraoui and Abdelhak Mourad Gu{\'e}roui and Makhlouf Aliouat and Tanveer A. Zia},
  journal={Ad Hoc Sens. Wirel. Networks},
  year={2011},
  volume={12},
  pages={295-324}
}
Data aggregation in wireless sensor networks (WSN) is a rapidly emerging research area. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However, securing data aggregation in WSN is made even more challenging, by the fact that the sensor nodes and aggregators deployed in hostile environments are exposed to various security threats. In this paper, we survey the current research related to security in data aggregation… 

Figures and Tables from this paper

Adaptive security level for data aggregation in Wireless Sensor Networks
This work introduces a novel secure data aggregation framework for Wireless Sensor Networks. It ensures the accuracy of data aggregation value without neglecting energy efficiency, even if all
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
TLDR
A framework that enhances availability with efficiency close to that of in-network aggregation avoiding over-reliance on sensors and a two hierarchical levels of monitoring to ensure the integrity and the accuracy of aggregate result, only when necessary, i.e. only when malicious activities are detected.
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
TLDR
RAHIM is presented, a reactive defense to secure data aggregation scheme in cluster-based wireless sensor networks based on a novel application of adaptive hierarchical level of monitoring providing accuracy of data aggregation result in lightweight manner, even if all aggregator nodes and a part of sensors are compromised in the network.
A reliable trust management scheme in wireless sensor networks
  • Nabila Labraoui
  • Computer Science
    2015 12th International Symposium on Programming and Systems (ISPS)
  • 2015
TLDR
This paper presents a Trust Model based on Risk evaluation (TMR) to effectively deal with conflicting behaviors of malicious nodes and shows how risk factor evaluation can make the trust model more reliable because it becomes more sensitive to on-off attack.
Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation
  • S. Swathi, H. Yogish
  • Computer Science
    2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)
  • 2018
TLDR
A novel algorithm known as Efficient-CSDA (Consensus based data aggregation) algorithm, which allows the neighbouring node to detect the dishonest nodes is presented and comparison between two algorithms clearly shows that the algorithm outperforms the existing one.
Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks
TLDR
A Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure and is effective in detecting and defending against wormhole attacks with a high detection rate.
Secure range-free localization scheme in Wireless sensor networks
TLDR
A Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure and it is shown that the solution is effective in detecting and defending against wormhole attacks with a high detection rate.
Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks
TLDR
The main idea of the approach is to plug in a proactive countermeasure to the basic DV‐Hop scheme called Infection prevention, which is effective in detecting and defending against wormhole attacks with a high detection rate.
A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks
TLDR
A Risk-aware Reputation-based Trust (RaRTrust) model for WSNs that uses both reputation and risk to evaluate trustworthiness of a sensor node, which is robust to on–off attack and differ from other trust models based only on reputation.
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks
TLDR
This work designs two efficient aggregation schemes for a wireless sensor network of n randomly placed sensors, and theoretically proves that their protocol achieves the optimal tradeoffs, and derives the optimal aggregation throughput depending on a given threshold value on gathering efficiency.
...
...

References

SHOWING 1-10 OF 83 REFERENCES
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
  • H. Alzaid, E. Foo, J. Nieto
  • Computer Science
    2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies
  • 2008
TLDR
A Reputation-based Secure Data Aggregation for WSNs (RSDA) that integrates aggregation functionality with the advantages provided by a reputation system to enhance the network lifetime and the accuracy of the aggregated data.
SRDA: secure reference-based data aggregation protocol for wireless sensor networks
TLDR
Simulation results show that the proposed protocol yields significant savings in energy consumption while preserving data security, and also establishes secure connectivity among sensor nodes without any online key distribution.
Security support for in-network processing in Wireless Sensor Networks
TLDR
This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes.
SIA: secure information aggregation in sensor networks
TLDR
This paper is the first on secure information aggregation in sensor networks that can handle a malicious aggregator and sensor nodes, and presents efficient protocols for secure computation of the median and the average of the measurements, for the estimation of the network size, and for finding the minimum and maximum sensor reading.
Securing wireless sensor networks against aggregator compromises
TLDR
By applying three schemes to secure data aggregation that rely on multipath routing, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.
Secure and Reliable Data Aggregation for Wireless Sensor Networks
TLDR
Simulation results show that the proposed protocol improves the security and reliability of aggregated data significantly.
A security framework for wireless sensor networks
  • T. Zia, Albert Y. Zomaya
  • Computer Science
    Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006.
  • 2006
TLDR
In this paper, a security framework is introduced to address the special security needs of tiny sensor nodes and sensor networks as a whole and focuses on three areas: cluster formation, secure key management scheme, and a secure routing algorithm.
Secure Aggregation in Sensor Networks Using Neighborhood Watch
TLDR
This paper studies stealth attacks where an adversary seeks to deceive the system without being detected, and proposes several measures to make a sensor network resilient to attack, including mutual monitoring and constraint validation, randomized delivery trees, and redundancy in the data supplied by the network.
Resilient aggregation in sensor networks
TLDR
This paper examines several approaches for making these aggregation schemes more resilient against certain attacks, and proposes a mathematical framework for formally evaluating their security.
Secure aggregation for wireless networks
  • Lingxuan Hu, David Evans
  • Computer Science
    2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
  • 2003
TLDR
This work presents a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises, and takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.
...
...