Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks

Kaushal SHAH, Devesh JINWALA

PDF(1062 KB)
PDF(1062 KB)
Front. Comput. Sci. ›› 2021, Vol. 15 ›› Issue (6) : 156813. DOI: 10.1007/s11704-021-9460-6
RESEARCH ARTICLE

Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks

Author information +
History +

Abstract

The Wireless Sensor Networks (WSNs) used for the monitoring applications like pipelines carrying oil, water, and gas; perimeter surveillance; border monitoring; and subway tunnel monitoring form linearWSNs. Here, the infrastructure being monitored inherently forms linearity (straight line through the placement of sensor nodes). Therefore, suchWSNs are called linear WSNs. These applications are security critical because the data being communicated can be used for malicious purposes. The contemporary research of WSNs data security cannot fit in directly to linear WSN as only by capturing few nodes, the adversary can disrupt the entire service of linear WSN. Therefore, we propose a data aggregation scheme that takes care of privacy, confidentiality, and integrity of data. In addition, the scheme is resilient against node capture attack and collusion attacks. There are several schemes detecting the malicious nodes. However, the proposed scheme also provides an identification of malicious nodes with lesser key storage requirements. Moreover, we provide an analysis of communication cost regarding the number of messages being communicated. To the best of our knowledge, the proposed data aggregation scheme is the first lightweight scheme that achieves privacy and verification of data, resistance against node capture and collusion attacks, and malicious node identification in linear WSNs.

Keywords

linear wireless sensor networks / secure data aggregation / privacy / malicious node identification

Cite this article

Download citation ▾
Kaushal SHAH, Devesh JINWALA. Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks. Front. Comput. Sci., 2021, 15(6): 156813 https://doi.org/10.1007/s11704-021-9460-6

References

[1]
Romer K, Mattern F. The design space of wireless sensor networks. IEEE Wireless Communications, 2004, 11(6): 54–61
CrossRef Google scholar
[2]
Shah K, Jinwala D C. A secure expansive aggregation in wireless sensor networks for linear infrasturcture. In: Proceedings of IEEE Region 10 Symposium. 2016, 207–212
CrossRef Google scholar
[3]
Martin K M, Paterson M B. Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure. In: Proceedings of IFIP International Workshop on Information Security Theory and Practices. 2009, 143–152
CrossRef Google scholar
[4]
Camtepe S A, Yener B. Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report. 2005
CrossRef Google scholar
[5]
Xiao Y, Rayi V K, Sun B, Du X, Hu F, Galloway M. A survey of key management schemes in wireless sensor networks. Computer Communications, 2007, 30(11): 2314–2341
CrossRef Google scholar
[6]
Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002, 41–47
CrossRef Google scholar
[7]
Martin K M, Paterson M. An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science, 2008, 192(2): 31–41
CrossRef Google scholar
[8]
Shah K A, Jinwala D C. Novel approach for pre-distributing keys in WSNs for linear infrastructure. Wireless Personal Communications, 2017, 95(4): 3905–3921
CrossRef Google scholar
[9]
Jawhar I, Mohamed N. A hierarchical and topological classification of linear sensor networks. In: Proceedings of IEEE Wireless Telecommunications Symposium. 2009, 1–8
CrossRef Google scholar
[10]
Henry K J, Stinson D R. Resilient aggregation in simple linear sensor networks. IACR Cryptology ePrint Archive. 2014, 288
CrossRef Google scholar
[11]
Girao J, Westhoff D, Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proceedings of IEEE International Conference on Communications. 2005, 3044–3049
[12]
Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 2006, 5(10): 1417–1431
CrossRef Google scholar
[13]
Frikken K B, Dougherty IV J A. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In: Proceedings of the 1st ACM Conference on Wireless Network Security. 2008, 68–76
CrossRef Google scholar
[14]
Hu L, Evans D. Secure aggregation for wireless networks. In: Proceedings of IEEE Applications and the Internet Workshops. 2003, 384–391
[15]
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. In: Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems. 2003, 255–265
[16]
Roy S, Setia S, Jajodia S. Attack-resilient hierarchical data aggregation in sensor networks. In: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. 2006, 71–82
CrossRef Google scholar
[17]
Shah K A, Jinwala D C. Novel approach of key predistribution for grid based sensor networks. Wireless Personal Communications, 2019, 108(2): 1–17
CrossRef Google scholar
[18]
Shah K A, Jinwala D C. Privacy preserving, verifiable and resilient data aggregation in grid-based networks. The Computer Journal, 2018, 61(4): 614–628
CrossRef Google scholar
[19]
Shah K, Jinwala D C. Performance analysis of symmetric key ciphers in linear and grid based sensor networks. Computer Science & Information Technology, 2018, 8(4): 53–68
CrossRef Google scholar
[20]
Buttyán L, Schaffer P, Vajda I. Cora: correlation-based resilient aggregation in sensor networks. Ad Hoc Networks, 2009, 7(6): 1035–1050
CrossRef Google scholar
[21]
Chan A C, Castelluccia C. A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Transactions on Sensor Networks, 2011, 7(4): 29
CrossRef Google scholar
[22]
Li Z, Gong G. Data aggregation integrity based on homomorphic primitives in sensor networks. In: Proceedings of Springer International Conference on Ad-Hoc and Wireless Networks. 2010, 149–162
CrossRef Google scholar
[23]
Peter S, Westhoff D, Castelluccia C. A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20–34
CrossRef Google scholar
[24]
Reddy Y B. A game theory approach to detect malicious nodes in wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Sensor Technologies and Applications. 2009, 462–468
CrossRef Google scholar
[25]
Acharya R, Asha K. Data integrity and intrusion detection in wireless sensor networks. In: Proceedings of the 16th IEEE International Conference on Networks. 2008, 1–5
CrossRef Google scholar
[26]
Sang Y, Shen H, Inoguchi Y, Tan Y, Xiong N. Secure data aggregation in wireless sensor networks: a survey. In: Proceedings of the 7th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies. 2006, 315–320
CrossRef Google scholar
[27]
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612–619
CrossRef Google scholar
[28]
Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, 278–287
CrossRef Google scholar
[29]
Kargl F, Klenk A, Schlott S, Weber M. Advanced detection of selfish or malicious nodes in ad hoc networks. In: Proceedings of Springer European Workshop on Security in Ad-hoc and Sensor Networks. 2004, 152–165
CrossRef Google scholar
[30]
Nasser N, Chen Y. Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: Proceedings of IEEE International Conference on Communications. 2007, 1154–1159
CrossRef Google scholar
[31]
Li H, Li K, Qu W, Stojmenovic I. Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks. Future Generation Computer Systems, 2014, 37: 108–116
CrossRef Google scholar
[32]
Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Communications of the ACM, 2004, 47(6): 53–57
CrossRef Google scholar
[33]
Raymond D R, Midkiff S F. Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Computing, 2008, 7(1): 74–81
CrossRef Google scholar
[34]
Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. In: Proceedings of the 22nd IEEE International Conference on Distributed Com puting Systems. 2002, 457–458
[35]
Kalpakis K, Dasgupta K, Namjoshi P. Maximum lifetime data gathering and aggregation in wireless sensor networks. In: Proceedings of IEEE International Conference on Networking. 2002, 685–696
CrossRef Google scholar
[36]
Krishnamachari L, Estrin D, Wicker S. The impact of data aggregation in wireless sensor networks. In: Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems Workshops. 2002, 575–578
[37]
Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks, 2009, 53(12): 2022–2037
CrossRef Google scholar
[38]
Roy S, Conti M, Setia S, Jajodia S. Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 1040–1052
CrossRef Google scholar
[39]
Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B. A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 2020, 7(6): 4682–4696
CrossRef Google scholar
[40]
Shah K, Patel D. Exploring the access control policies of web-based social network. In: Kumar A, Paprzycki M, Gunjan V, eds. Springer ICDSMLA. Springer, Singapore, 2020, 1614–1622
CrossRef Google scholar
[41]
Li M, Sun Y, Lu H, Maharjan S, Tian Z. Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems. IEEE Internet of Things Journal, 2019, 7(7): 6266–6278
CrossRef Google scholar
[42]
Tian Z, Luo C, Qiu J, Du X, Guizani M. A distributed deep learning system for web attack detection on edge devices. IEEE Transactions on Industrial Informatics, 2019, 16(3): 1963–1971
CrossRef Google scholar
[43]
Tian Z, Gao X, Su S, Qiu J. Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles. IEEE Internet of Things Journal, 2019, 7(5): 3901–3909
CrossRef Google scholar
[44]
Qiu J, Du L, Zhang D, Su S, Tian Z. Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city. IEEE Transactions on Industrial Informatics, 2019, 16(4): 2659–2666
CrossRef Google scholar
[45]
Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Sun Y, Guizani N. Realtime lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Transactions on Industrial Informatics, 2019, 15(7): 4285–4294
CrossRef Google scholar
[46]
Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M. Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Transactions on Vehicular Technology, 2019, 68(6): 5971–5980
CrossRef Google scholar
[47]
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy. 2005, 49–63
[48]
Yang Y,Wang X, Zhu S, Cao G. Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. ACM Transactions on Information and System Security, 2008, 11(4): 18
CrossRef Google scholar
[49]
De Meulenaer G, Gosset F, Standaert F X, Pereira O. On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of IEEE International Conference onWireless and Mobile Computing. 2008, 580–585
CrossRef Google scholar

RIGHTS & PERMISSIONS

2021 Higher Education Press
AI Summary AI Mindmap
PDF(1062 KB)

Accesses

Citations

Detail

Sections
Recommended

/