Abstract
Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In untrusted environments, sensors may potentially be compromised. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation result is corrupted by an attacker. However, the attacker (controlling the compromised sensors) can keep corrupting the result, rendering the system unavailable. This paper aims to enable aggregation queries to tolerate instead of just detecting the adversary. To this end, we propose a novel tree sampling algorithm that directly uses sampling to answer aggregation queries. It leverages a set sampling protocol to overcome a well-known obstacle in sampling—traditional sampling technique is only effective when the predicate count or sum is large. Set sampling can efficiently sample a set of sensors together, and determine whether any sensor in the set satisfies the predicate (but not how many). With set sampling as a building block, tree sampling can provably generate a correct answer despite adversarial interference, while without the drawbacks of traditional sampling techniques.
Similar content being viewed by others
References
Aspnes, J., Blais, E., Demirbas, M., O’Donnell, R., Rudra, A., Uurtamo, S.: k + Decision trees. In: International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, Revised Selected Papers, vol. 6451 of Lecture Notes in Computer Science. Springer-Verlag, pp. 74–88 July (2010)
Bar-Yehuda R., Goldreich O., Itai A.: On the time-complexity of broadcast in radio networks: an exponential gap between determinism and randomization. J. Comput. Syst. Sci. 45, 104–126 (1992)
Ben-Asher Y., Newman I.: Decision trees with Boolean threshold queries. J. Comput. Syst. Sci. 51(3), 495–502 (1995)
Buhrman H., De Wolf R.: Complexity measures and decision tree complexity: a survey. Theoretical Comput. Sci. 288(1), 21–43 (2002)
Chan H., Perrig A., Przydatek B., Song D.: SIA: secure information aggregation in sensor networks. J. Comput. Security (Special Issue on Security of Ad Hoc and Sensor Networks) 15(1), 69–102 (2007)
Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation for sensor networks. In: Proceedings of the ACM Conference on Computer and Communications Security (2006)
Chen Z., Bai Z., Sinha B.K.: Ranked Set Sampling: Theory and Applications. Springer, New York (2003)
Dagum P., Karp R., Luby M., Ross S.: An optimal algorithm for Monte Carlo estimation. SIAM J. Comput. 29(5), 1484–1496 (2000)
Deng J., Han R., Mishra S.: Limiting DoS attacks during multihop data delivery in wireless sensor networks. Int. J. Security Networks, (Special Issue on Security Issues in Sensor Networks) 1(1/2), 167–178 (2006)
Du, W., Deng, J., Han, Y., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of Global Telecommunications Conference (2003)
Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (2005)
Dubhashi D.: Simple proofs of occupancy tail bounds. Random Struct. Algorithms 11(2), 119–123 (1997)
Estan C., Varghese G., Fisk M.: Bitmap algorithms for counting active flows on high-speed links. IEEE/ACM Trans. Networking 14(5), 925–937 (2006)
Flajolet P., Martin G.N.: Probabilistic counting algorithms for database applications. J. Comput. Syst. Sci. 31(2), 182–209 (1985)
Frikken, K., Dougherty, J.: An efficient Integrity-preserving Scheme for Hierarchical Sensor Aggregation. In: Proceedings of the ACM Conference on Wireless Network Security (2008)
Gandhi, S., Suri, S., Welzl, E.: Catching elephants with mice: sparse sampling for monitoring sensor networks. In: SenSys (2007)
Garofalakis, M., Hellerstein, J.M., Maniatis, P.: Proof sketches: verifiable in-network aggregation. In: Proceedings of the International Conference on Data Engineering (2007)
Gura, N. Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (2004)
Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of Workshop on Security and Assurance in Ad hoc Networks (2003)
Jadia, P., Mathuria, A.: Efficient secure aggregation in sensor networks. In: Proceedings of the 11th International Conference on High Performance Computing (2004)
Kamath A., Motwani R., Palem K., Spirakis P.: Tail bounds for occupancy and the satisfiability threshold conjecture. Random Struct. Algorithms 7(1), 59–80 (1995)
Madden, S., Franklin, M., Hellerstein, J., Hong, W.: TAG: A tiny aggregation service for Ad-Hoc sensor networks. In: Proceedings of the Symposium on Operating Systems Design and Implementation (2002)
Mahimkar, A., Rappaport, T.: SecureDAV: a secure data aggregation and verification protocol for sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (2004)
Mitzenmacher M., Upfal E.: Probability and Computing—Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, Cambridge, England (2005)
Nath, S., Gibbons, P.B., Seshan, S., Anderson, Z.: Synopsis diffusion for robust aggregation in sensor networks. In: SenSys (2004)
Nath, S., Yu, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD June 2009
Ning P., Liu A., Du W.: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sensor Networks 4(1), 1–35 (2008)
Perrig A., Szewczyk R., Wen V., Culler D., Tygar D.: SPINS: Security protocols for sensor networks. Wireless Networks J. (WINE) 8(5), 521–534 (2002)
Roy, S., Setia, S., Jajodia, S.: Attack-resilient hierarchical data aggregation in sensor networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (2006)
Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of the ACM Workshop on Security of Ad hoc and Sensor Networks (2004)
Wang, R., Du, W., Ning, P.: Containing denial-of-service attacks in broadcast authentication in sensor networks. In: Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (2007)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE. Commun. Surveys Tutorials 8(2) (2006)
Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure Hop-by-Hop data aggregation protocol for sensor networks. In: Proceedings of ACM Symposium on Mobile Ad hoc Networking and Computing (2006)
Yu, H.: Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In: ACM/IEEE IPSN (2009)
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is partly supported by Young Investigator Award R-252-000-334-101 from National University of Singapore. A preliminary conference version of this paper appeared as [34].
Rights and permissions
About this article
Cite this article
Yu, H. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. Distrib. Comput. 23, 373–394 (2011). https://doi.org/10.1007/s00446-011-0130-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00446-011-0130-z