Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks

被引:107
作者
Ozdemir, Suat [1 ]
Cam, Hasan [2 ]
机构
[1] Gazi Univ, Dept Comp Engn, TR-06570 Ankara, Turkey
[2] Altusys Corp, Trenton, NJ 08648 USA
关键词
Data aggregation; data integrity; network-level security; sensor networks;
D O I
10.1109/TNET.2009.2032910
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
In wireless sensor networks, compromised sensor nodes can inject false data during both data aggregation and data forwarding. The existing false data detection techniques consider false data injections during data forwarding only and do not allow any change on the data by data aggregation. However, this paper presents a data aggregation and authentication protocol, called DAA, to integrate false data detection with data aggregation and confidentiality. To support data aggregation along with false data detection, the monitoring nodes of every data aggregator also conduct data aggregation and compute the corresponding small-size message authentication codes for data verification at their pairmates. To support confidential data transmission, the sensor nodes between two consecutive data aggregators verify the data integrity on the encrypted data rather than the plain data. Performance analysis shows that DAA detects any false data injected by up to T compromised nodes, and that the detected false data are not forwarded beyond the next data aggregator on the path. Despite that false data detection and data confidentiality increase the communication overhead, simulation results show that DAA can still reduce the amount of transmitted data by up to 60% with the help of data aggregation and early detection of false data.
引用
收藏
页码:736 / 749
页数:14
相关论文
共 27 条
[1]
A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]
[Anonymous], P 12 ANN INT CRYPT C
[3]
[Anonymous], RESEARCH-CHINA, DOI DOI 10.18502/JDER.4069
[4]
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[5]
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[6]
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[7]
Energy-efficient secure pattern based data aggregation for wireless sensor networks [J].
Çam, H ;
Özdemir, S ;
Nair, P ;
Muthuavinashiappan, D ;
Sanli, HO .
COMPUTER COMMUNICATIONS, 2006, 29 (04) :446-455
[8]
Deng J, 2005, LECT NOTES COMPUT SC, V3794, P732
[9]
NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]
DONG Q, 2007, P IFIP INT C NETW, P251