How To Secure Data Aggregation In A Wireless Sensor Network



Similar documents
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

Wireless Sensor Network: Challenges, Issues and Research

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Security Solutions for Wireless Sensor Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Networks Chapter 14: Security in WSNs

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

End-to-end Secure Data Aggregation in Wireless Sensor Networks

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Securing MANET Using Diffie Hellman Digital Signature Scheme

Single Sign-On Secure Authentication Password Mechanism

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

An Elliptic Curve based Hierarchical Cluster Key Management in Wireless Sensor Network


QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Security Sensor Network. Biswajit panja

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

A Security Architecture for. Wireless Sensor Networks Environmental

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Efficient Data Transmission For Wireless Sensor Networks

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3

ACCELERATED BROADCAST AUTHENTICATION WITH SIGNATURE AMORTIZATION FOR WSNS

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

New System Security Model for a Mobile Operator s Meshed Access Network

International Journal of Recent Trends in Electrical & Electronics Engg., Feb IJRTE ISSN:

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Routing Protocols for Wireless Sensor Networks

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Security for Ad Hoc Networks. Hang Zhao

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Depiction of Body Area Network in Cloud Environment

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

SECURITY VULNERABILITY ISSUES IN WIRELESS

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

Some Security Trends over Wireless Sensor Networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Secure Data Aggregation in Wireless Sensor Networks

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Transcription:

A Framework: Secure Data Aggregation in Wireless Sensor Networks Vimal Pambhar 1, Bhoomi Bangoria 2, Bhavik Kataria 3 Assistant professor, Dept. of CSE/IT, Dr. Shubhash Technical campus, Junagadh, Gujarat, India 1 PG Student [CE], Dept. of CE, Noble Engineering College, Junagadh, Gujarat, India 2 PG Student [SE], Dept. of CSE, RKDF Institute of Science and Technology, Bhopal, Madhya Pradesh, India 3 ABSTRACT: Wireless Sensor Networks (WSNs) are used in many applications in the area of tracking and monitoring. WSNs have many constraints like low computational power, small memory, and limited energy resources. Most of the energy consumption is due to data transmission. For that we apply Data aggregation approach on the sensed data by the deployed sensor nodes. This approach helps to reduce the number of transmissions and improves the life time of wireless sensor network with less energy usage of sensor nodes and also to protect Data Aggregation process from various kinds of attacks becomes extremely critical. So we give some general framework for Secure Data Aggregation. Keywords: wireless sensor network, sensor node, security, attacks, cluster, Data Aggregation. I.INTRODUCTION The Sensor Network can be described as a collection of sensor nodes which co-ordinate to perform some specific action. Unlike traditional networks, sensor networks depend on dense deployment and co-ordination to carry out their tasks. Sensor Networks consisted of small number of sensor nodes that were wired to a central processing station. However, nowadays, the focus is more on Wireless Sensor Networks. In Figure 1 shows Wireless Sensor Network Architecture. Wireless sensor networks are consisting of numerous light weight and tiny sensor nodes with limited power, storage, communication and computation capabilities. Wireless sensor networks are being employed in civilian applications like habitat monitoring to mission critical Applications. Fig. 1 Wireless sensor networks Architecture [1] A sensor node is made up of four basic components as shown in Figure 2 a sensing unit, a processing unit, a transceiver unit and a power unit. They may also have application dependent additional components such as a location finding system, a power generator and a mobilizerusers. Copyright to IJAREEIE www.ijareeie.com 3077

Fig. 2 Component of sensor Nodes [2]. II. GENERAL SURVEY OF WIRELESS SENSOR NETWORKS (WSNS). Several attempts were made by the researchers to study the major challenges in WSNs, security requirements of WSNs, Constraints of WSNs. That survey mentions in below Table 1. WSNs Major Challenges Mobility and topology changes Due to mobility of Sensor nodes network topology would be changed dynamically. Energy constraints Limited battery power of small tiny sensor nodes. Security Issues All the traditional networks security approaches are cannot directly apply on WSNs. WSNs Constraints Limited Resources like computational energy (Battery). Physical memory, power, Scalability- The protocols must be scalable enough to respond and operate with such large number of sensor nodes. Quality of Service the data should be delivered within a certain period of time from the moment it is sensed otherwise the data will be careless. WSNs Security Requirements Availability Networks services are available even in the presence of denial-ofservice attacks. Authentication a malicious node cannot masquerade as a trusted network node. Confidentiality a given message cannot be understood by anyone other than the desired recipients. Integrity a message sent from one node to another is not modified by malicious intermediate nodes. Authorization Only authorized sensors can be involved in providing information to network services. Table 1. A Survey for Wireless Sensor networks. III. DATA AGGREGATION The architecture of the sensor network plays important role in the performance of data aggregation protocols. Several data aggregation protocols have been proposed.these protocols can be classified based on network models. There are two categories: Tree based data aggregation [9] and cluster based data aggregation. Copyright to IJAREEIE www.ijareeie.com 3078

Cluster based Data aggregation [8] is the process of combining the data coming from various sources and en route them after removing redundancy such as to improve the overall network lifetime. The in-network processing is done on the aggregator node. The aggregator node aggregate the data received from its child node as per the required aggregation function (like min, max, average, sum etc.) and send the aggregated result to the other high level aggregated node. An Aggregation Scenario using Clustering shown in Figure 3 in that cluster heads collect the data from all the neighbours sensor nodes and forwarded that data to the Base Station (Sink Node).Base station sends that information to the external network via Internet. External Network External Network Base Station Cluster Head Cluster Head External Network Sensor Node Cluster Head Sensor Node Sensor Node Fig. 3. Aggregation Scenario using Clustering [10]. IV. CLASSIFICATION OF SECURE DATA AGGREGATION The work on secure data aggregation can be classified based on encryption of data at specific nodes into three categories, hop-by-hop encrypted data aggregation end-to-end encrypted data aggregation [12] and Privacy Homomorphism.. A. Hop-by-Hop encrypted data aggregation In the hop-by-hop encrypted data aggregation [13], intermediate nodes decrypt every message received by them. so, get the plaintext.then aggregate the plaintext according to the aggregate function, and encrypt the aggregate result before transmitting it. In this all the intermediate sensor node has to decrypt the received data and apply aggregation function on it. Due to many decryptions perform by the intermediate node it s consuming more battery power and not provide end-to-end security. B. End-to-End encrypted data aggregation In order to overcome the drawbacks of the hop-by-hop encrypted data aggregation [14, 15, 17] a set of end-to-end encrypted data aggregation protocols are proposed. In those schemes, intermediate nodes can aggregate the cipher text directly without decrypting the messages. Compared to the hop-by-hop one, it can guarantee the end-to-end data confidentiality and result in less transmission latency and computation cost. Adversaries will not be able to recognize what reading it is during data transmission. In terms of privacy, they designed aims to eliminate redundant reading for data aggregating but this reading remains secret to the aggregator. C. Privacy Homomorphism A Privacy Homomorphism (PH) [18] is an encryption transformation that allows direct computation on encrypted data. In homomorphic encryption certain aggregation functions can be calculated on the encrypted data. The data is encrypted and sent toward the base station, while sensors along the path apply the aggregation function on the encrypted data. The base station receives the encrypted aggregate result and decrypts it. Specifically, a homomorphic encryption scheme allows the following property to hold enc (a + b) = enc (a) + enc (b) Copyright to IJAREEIE www.ijareeie.com 3079

This means that in order to calculate the SUM of two values, we can apply some function to their encrypted counterparts and then decrypt the result of the SUM operation at sink node. The data would be encrypted at the sensor node, the SUM or AVERAGE would be calculated as the aggregate result follows a path to the base station, and the final result would be decrypted at the base station. V. A GENERAL FRAMEWORK OF SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORK. In a general framework of Secure Data Aggregation, First, we discuss about the how to make clusters for the randomly placed nodes using Heartbeat node placement algorithm. We modify Appheartbeat protocol for the implementation of the clustering for the Data Aggregation. For the simulation we use Jist (java in simulation time)/swan (Scalable Wireless Ad-hoc Networks) Simulator. Some of the nodes will work as cluster heads. These cluster heads are responsible to receive message or data from their neighbours. Each cluster head send hello message to all other nodes, those nodes which are in the range of cluster head they send the message back to cluster head and join with that cluster for further processing. We measure energy usage by every cluster head by the energy model which is integrated in the SWAN simulator and also show the comparison graph of energy usage by clusters heads between static and dynamic clusters heads selection procedure. In below figure we mention the steps for the Data Aggregation using cluster based Data Aggregation for that we modify Apphertbeat protocol which is my default protocol given in SWAN simulator. Fig. 4 Data Aggregation (SUM) Architecture in JiST/SWAN. We apply privacy on sending data by the sensor nodes to the Cluster head. We apply end to end symmetric cryptography based on Privacy Homomorphism on the sending data. Figure 5 represents End to End privacy approach, in that S 1, S 2,..., Sn. nodes sense the data from the environment, before sending it to cluster head or aggregator node, It they apply encryption method on it and then send encrypted data to the cluster head. Perform SUM function on encrypted data using Privacy Homomorphism and sends this encrypted aggregated result to the base station. Base station applies decryption method on that data and gets original data. During this whole procedure we measure the energy usage by the cluster heads. Copyright to IJAREEIE www.ijareeie.com 3080

Fig. 5 End to End Secure Data Aggregation VI.CONCLUSION By reviewing the existing data aggregation in the WSN, an adversarial model that can be more useful to save the energy of Wireless sensor Nodes that lead to improve the life time of whole networks. An adversarial model for security on Data Aggregation its help us to give batter performance compare to existing scheme. VII. FUTURE WORK In future work, this method can be made more scalable and finetuned with the multi level clustering where the cluster can have two to three level tree so the cluster can cover more number of nodes with lower energy consumption. It is also planned to evaluate more secure schemes and extend the framework if necessary. We hope that our work will encourage other researchers to consider the vital problem of secure information aggregation in sensor networks. REFERENCES [1] Akyildiz, I.F. Weilian Su Sankarasubramaniam, Y. Cayirci, E. Georgia, A survey on sensor networks, IEEE communication magazine,vol.30,no.8,pp. 102 114, 2002. [2] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, Sensor Network Security: A Survey, IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, Second Quarter, 2009. [3] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks, volume 38,pp. 393 422,2002. [4] Yong Wang, Garhan Attebury, and Byrav Ramamurthy, A Survey Of Security Issues In Wireless Sensor Networks, IEEE Communication, 2nd quarter, volume 8, NO. 2,2006. [5] Hemanta Kumar Kalita and Avijit Kar, Wireless Sensor Network Security Analysis, International Journal of Next-Generation Networks (IJNGN), Vol.1, No.1, December 2009.. [6] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey,computer Networks,vol. 52,pp. 2292 2330,2008. [7] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, Sensor Network Security: A Survey,Ieee Communications Surveys & Tutorials, Vol. 11, No. 2, pp 55-77,second quarter 2009, [8] Mukesh Kumar Jha, T.P. Sharma, Secure Data aggregation in Wireless Sensor Network: A Survey, Computer Networks,2005. [9] Elena Fasolo and Michele Rossi, Network Aggregation Techniques For Wireless Sensor Networks: A Survey, Ieee Wireless Communications, April 2007. [10] Hani Alzaid Ernest Foo Juan Gonzalez Nieto, Secure Data Aggregation in Wireless Sensor Network: a survey, Conferences in Research and Practice in Information Technology (CRPIT), Vol. 81, January 2008. [11] Nandini. S. Patil, Prof. P. R. Patil, Data Aggregation in Wireless Sensor Network, IEEE International Conference on Computational Intelligence and Computing Research, 2010. [12] Yingpeng Sang, Hong Shen, Secure Data Aggregation inwireless Sensor Networks: A Survey, Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), 2006. [13] Xiaoyan Wang, Jie Li, Xiaoning Peng And Beiji Zou, Secure And Efficient Data Aggregation For Wireless Sensor Networks, IEEE Seventh vehicular Technology Conference Fall,pp. 1-5, 2010. [14] C.Castelluccia, E.Mykletun, G.Tsudik, Efficient Aggregation of Encrypted data in wireless sensor network, in: Proceeding of the conference on mobile and Ubiquitous System: Networking and Services, pp.109-117, 2005. [15] D. Westhoff, J. Girao, M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution and Routing Adaptation, IEEE Transactions on Mobile Computing, Vol. 5, No. 10, pp. 1417-1431, 2006. [16] Shih-I Huang, Shiuhpyng shieh, J.D.Tygar, Secure encrypted data aggregation for wireless sensor networks, Springer, 2009. [17] A.S.Poornima, B.Amberker, SEEDA: Secure End to End data Aggregation in Wireless sensor networks, IEEE Seventh International Conference on Wireless and Optical Communication Network,pp.1-5, 2010. [18] Josep Ferrer and Domingo, A new privacy homomorphism and applications, In: Inf. Process. Lett. 60(5), pp. 277 282, 1996. Copyright to IJAREEIE www.ijareeie.com 3081

BIOGRAPHY Vimal J. Pambhar has completed the M.Tech in Computer Engineering from U.V. Patel College of Engineering, Ganpat University, and Gujarat, India. His Research area is Secure Data Aggregation in Wireless Sensor Network Subject. Right now he is work as Assistant Professor at CSE/IT Department in Dr.Subhash Technical Campus, Junagadh, Gujarat-362001, and India. Bhoomi M. Bangoria is pursuing M.E scholar in Computer Engineering from Noble Engineering College, Junagadh, Gujarat-362001, and India. Kataria Bhavikkumar M. is pursuing M.Tech. in Software Engineering from RKDF Institute of Science and Technology, Bhopal, Madhya Pradesh and He has completed his B.E. in Computer Engineering from C.U.Shah College of Engineering and Technology, Wadhwan City, Gujarat. Now days he is working as Assistant Professor in Dr. Subhash Technical Campus, Junagadh, Gujarat. Copyright to IJAREEIE www.ijareeie.com 3082