Abstract
In recent years, wireless sensor networks (WSNs) have become a useful tool for environmental monitoring and information collection due to their strong sensory ability. Whereas WSNs utilize wireless communication and is usually deployed in an outdoors environment, which make them vulnerable to be attacked and then lead to the privacy disclosure of the monitored environment. SUM, as one common query among the queries of WSNs, is important to acquire a high-level understanding of the monitored environment and establish the basis for other advanced queries. In this paper, we present a secure hash-based privacy preservation mechanism called HP2M, which not only preserves the privacy of the monitored environment during SUM aggregation query, but also could achieve exact SUM aggregation. Furthermore, an integrity verification mechanism is proposed to verify the integrity of SUM aggregation result, which could alarm the system once data packets transmitted through the networks are modified. One main characteristic of HP2M and the proposed integrity verification mechanism is that they are lightweight with a small bandwidth consumption. Finally, some numerical experiments are performed to demonstrate the efficiency of our proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, C., Lin, M., Lin, W.: Designing and implementing a lightweight WSN MAC protocol for smart home networking applications. J. Circ. Syst. Comput. 26(03), 1–20 (2017)
Yang, Z.P., Huang, Q.Z., Wang, M.: Study on application of wireless sensor networks in military highway transportation battlefield environment. Equip. Environ. Eng. 11(03), 78–82 (2014)
Ramadan, R., Elfouly, F., Mahmoud, M., Dessouky, M.: Efficient data reporting in a single and multi-object tracking using WSNs. In: IEEE Symposium Series on Computational Intelligence (2015)
Badescu, A.M., Cotofana, L.: A wireless sensor network to monitor and protect tigers in the wild. Ecol. Ind. 57, 447–451 (2015)
Lupu, T.-G., Rudas, I., Demiralp, M., Mastorakis, N.: Main types of attacks in wireless sensor networks. In: WSEAS Proceedings International Conference on Recent Advances in Computer Engineering, no. 9 (2009)
Ali, A.W., et al.: Energy efficieny in routing protocol and data collection approaches for WSN: a survey. In: 2015 International Conference on Computing, Communication and Automation (ICCCA), pp. 540–545 (2015)
Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: a survey. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 315–320 (2006)
Morell, A., Correa, A., Barcelo, M., Vicario, J.L.: Data aggregation and principal component analysis in WSNs. IEEE Trans. Wirel. Commun. 15(6), 3908–3919 (2016)
YongJian, F., Hong, C., Ying, Z.X.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1131–1146 (2012)
He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045–2053. IEEE (2007)
He, W., Nguyen, H., Liu, X., Nahrstedt, K.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Military Communications Conference, MILCOM 2008, pp. 1–7 (2008)
Li, C., Liu, Y.: ESMART: energy-efficient slice-mix-aggregate for wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(2), 1–9 (2013)
Papadopoulos, S., Kiayias, A., Papadias, D.: Secure and efficient in-network processing of exact SUM queries. In: IEEE International Conference on Data Engineering, pp. 517–528 (2011)
Desai, H.K., Jinwala, D.C.: Secure aggregation of exact sum queries with integrity protection for wireless sensor networks. Int. J. Comput. Appl. 73(15), 9–17 (2013)
Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings of IEEE INFOCOM, pp. 2024–2032 (2011)
Chen, W., Yu, L., Gao, D.: A privacy preserving histogram aggregation algorithm with integrity verification support. Chin. J. Electron. 42(11), 2268–2272 (2014)
Pavithra, M.N., Chinnaswamy, C.N., Sreenivas, T.H.: Privacy preservation scheme for WSNs using signature and trust value computation. Int. J. Eng. Tech. Res. 5(6), 50–53 (2016)
Agrawal, S., Das, M.L., Mathuria, A., Srivastava, S.: Program integrity verification for detecting node capture attack in wireless sensor network. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 419–440. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26961-0_25
Al-Riyami, A., Zhang, N., Keane, J.: An adaptive early node compromise detection scheme for hierarchical WSNs. IEEE Access 4, 4183–4206 (2016)
Nath, S., Yu, H., Chan, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June–July 2009, pp. 31–44 (2009)
Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Symposium on Operating Systems Design and Implementation Copyright Restrictions Prevent ACM From Being Able To Make the Pdfs for This Conference Available for Downloading, pp. 131–146 (2002)
Cryptographic hash function. https://en.wikipedia.org/wiki/Cryptographic_hash_function
Omnet++4.1. https://omnetpp.org/
“Grand-st-bernarddeployment,” http://lcav.epfl.ch/cms/lang/en/pid/86035
Acknowledgment
This work is supported by National Science Foundation of China (No. 61532021, 61772537, 61772536, 61702522), and National Key R & D program of China (No. 2016YFB1000702).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Liu, Y. et al. (2018). Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds) Database Systems for Advanced Applications. DASFAA 2018. Lecture Notes in Computer Science(), vol 10827. Springer, Cham. https://doi.org/10.1007/978-3-319-91452-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-91452-7_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91451-0
Online ISBN: 978-3-319-91452-7
eBook Packages: Computer ScienceComputer Science (R0)