Skip to main content

Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

Data aggregation is an important task in data centric heterogeneous wireless sensor networks because of its varying power and computational capabilities. Due to the deployment of sensor nodes in large numbers for different applications, a single node is not sufficient for performing data aggregation. Hence multiple nodes are required to summarize the relevant information from huge data sets. The process of data aggregation is vulnerable to many threats like loss of cryptographic keys, false data injection etc. To address these issues, we present the Secure Data Aggregation with Key Management (SDAKM) scheme. It provides a secure framework for the data centric heterogeneous wireless sensor networks using additive privacy homomorphism. It uses the heterogeneity of the sensor nodes for performing encrypted data processing and also provides an efficient key management scheme for data communication among sensor nodes in the network. This scheme offers higher security and has less computing overhead as it uses additive privacy homomorphism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.D.: A Key Management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, Washington DC, USA (2002)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, p. 197 (2003)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Key Predistribution Scheme for Sensor Networks using Deployment Knowledge. IEEE Transactions on Dependable and Secure Computing 3(1), 62–77 (2008)

    Google Scholar 

  4. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proc. 10th ACM Conf. Computer and Comm. Security (CCS), pp. 52–61 (2003)

    Google Scholar 

  5. Liu, D., Ning, P.: Location-Based Paiwise Key Establishments for Relatively Static Sensor Networks. In: Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  6. Huang, D., Mehta, M., van de Liefvoort, A., Medhi, M.: Modeling Pairwise Key Establishment for Random Key Predistribution in Large Scale Sensor Networks. IEEE/ACM Transactions on Networking 15(5), 1204–1215 (2007)

    Article  Google Scholar 

  7. Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-Aware Key Management Scheme for Wireless Sensor Networks. In: Proc. ACM Workshop Security of Ad Hoc ang Sensor Networks (2004)

    Google Scholar 

  8. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  9. Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In: Proc. IEEE INFOCOM (2005)

    Google Scholar 

  10. Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the Distribution and Revocation of Cryptography Keys in Sensor Networks. IEEE Transactions on Dependable and Secure Computing 2(3), 233–247 (2005)

    Article  Google Scholar 

  11. Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proc. of SenSys 2003, pp. 255–265 (2003)

    Google Scholar 

  12. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks. In: Proc. GLOBECOM 2003, pp. 1435–1439 (2003)

    Google Scholar 

  13. Wu, K., Dreef, D., Sun, B., Xiao, Y.: Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks 5(1), 100–111 (2007)

    Article  Google Scholar 

  14. Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. In: Proc. of ACM MOBIHOC 2006 (2006)

    Google Scholar 

  15. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation, 169–179 (1978)

    Google Scholar 

  16. Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sandhya, M.K., Murugan, K. (2010). Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics