Skip to main content

Advertisement

Log in

Selection of aggregator nodes and elimination of false data in wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

False data elimination is very important in ensuring data integrity in wireless sensor networks. In the existing security mechanisms, the aggregator nodes quickly drain out the batteries due to the computational overhead caused by data aggregation and false data elimination, which leads to reduced network lifetime. In this paper, aggregator node selection and false data elimination scheme is proposed to eliminate the false data injected in heterogeneous wireless sensor networks. In order to balance the battery power consumption among the sensor nodes and to improve the network lifetime, the aggregator nodes are selected periodically based on location, taking advantage of the energy heterogeneity of the sensor nodes in the network. The location based selection of aggregator nodes brings in security challenges in localization and symmetric key exchange. Secure verifiable multilateration technique is employed to resolve the security issues in localization. The problem of symmetric key exchange is resolved by using a cryptographic scheme based on Jacobian Elliptic Chebyshev Rational Map. This scheme provides a better solution when hybrid sensor/mesh architecture cannot be implemented. Simulation results indicate that this scheme offers higher false data filtering and improved network lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Akyildiz, F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.

    Article  Google Scholar 

  2. Hu, N., Wu, C., Ji, P., & Sun, Y. (2013). The deployment algorithm of heterogeneous wireless sensor networks based on energy-balance. In 25th Chinese Control and Decision Conference (CCDC), pp. 2884–2887.

  3. Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route detection and filtering of injected false data in sensor networks. Proceedings of IEEE INFOCOM, 4, 2446–2457.

    Google Scholar 

  4. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Transactions on Sensor Networks. doi:10.1145/1267060.1267062.

  5. Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. Proceedings of IEEE VTC, 2, 1223–1227.

    Google Scholar 

  6. Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.

    Article  Google Scholar 

  7. Li, J., Yu, L., Gao, H., & Xiong, S. (2012). Grouping-enhanced resilient probabilistic en-route filtering of injected false data in WSNs. IEEE Transactions on Parallel and Distributed Systems, 23(5), 881–889.

    Article  Google Scholar 

  8. Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of SenSys’03, pp. 255–265.

  9. Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of GLOBECOM’03, pp. 1435–1439.

  10. Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2007). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks, 5(1), 100–111.

    Article  Google Scholar 

  11. Yang, Y., Wang, X., Zhu, S., and Cao, G. (2006). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM MOBIHOC’06.

  12. Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In IEEE International Conference on MobiQuitous, pp. 109–117.

  13. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040–1052.

    Article  Google Scholar 

  14. Huang, S. I., Shieh, S., & Tygar, J. D. (2010). Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16(4), 915–927.

    Article  Google Scholar 

  15. Ozdemir, S., & Cam, H. (2010). Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–739.

    Article  Google Scholar 

  16. Coen-Porisini, A., & Sicari, S. (2012). Cross layer data assessment in wireless sensor networks. SENSORNETS, pp. 203–208.

  17. Sicari, S., Grieco, L.A., Rizzardi, A., Boggia, G., & Coen-Porisini, A. (2013). SETA: A secure sharing of tasks in clustered wireless sensor networks. In IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 239–246.

  18. Sicari, S., Coen-Porisini, A., & Riggio, R. (2013). DARE: Evaluating data accuracy using node reputation. Computer Networks, 57, 3098–3111.

    Article  Google Scholar 

  19. Li, Y., Xiao, G., Singh, G., & Gupta, R. (2013). Algorithms for finding best locations of cluster heads for minimizing energy consumption in wireless sensor networks. Wireless Networks, 19(7), 1755–1768.

    Article  Google Scholar 

  20. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences (HICSS).

  21. Thanigaivelu, K., & Murugan, K. (2012). Grid-based clustering with predefined path mobility for mobile sink data collection to extend network lifetime in wireless sensor networks. IETE Technical Review, 29(2), 133–147.

    Article  Google Scholar 

  22. Sirivianos, M., Westhoff, D., Armknecht, F., & Girao, J. (2007). Non-manipulable aggregator node election protocols for wireless sensor networks. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

  23. Buttyan, L., & Schaffer, P. (2007). PANEL: Position-based aggregator node election in wireless sensor networks. In Proceedings of the 4th IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–9.

  24. Sandhya, M. K., Murugan, K., & Devaraj, P. (2014). False data elimination in heterogeneous wireless sensor networks using location-based selection of aggregator nodes. IETE Journal of Research, 60(2), 145–155.

    Article  Google Scholar 

  25. Capkun, S., & Hubaux, J.-P. (2005). Secure positioning of wireless devices with application to sensor networks. Proceedings of IEEE INFOCOM, 2005(3), 1917–1928.

    Google Scholar 

  26. Gatti, N., Monga, M., & Sicari, S. (2010). Localization security in wireless sensor networks as a non-cooperative game. In International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 295–300.

  27. Basilico, N., Gatti, N., Monga, M., & Sicari, S. (2014). Security games for node localization through verifiable multilateration. IEEE Transactions on Dependable and Secure Computing, 11(1), 72–85.

    Article  Google Scholar 

  28. Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A pairwise key predistribution scheme for wireless sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51.

  29. Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information System Security, 8(1), 41–77.

    Article  Google Scholar 

  30. Deng, J., & Han, Y. S. (2005). Using MDS codes for the key establishment of wireless sensor networks. Mobile Ad-Hoc and Sensor Networks, Lecture Notes in Computer Science, 3794, 732–744.

    Article  Google Scholar 

  31. Dong, Q., & Liu, D. (2007). Using auxiliary sensors for pairwise key establishment in WSN. In: Proceedings of IFIP International Conference on Networking. Atlanta, GA, USA, pp. 251–262.

  32. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution scheme for sensor networks. In Proceedings of IEEE symposium on security and privacy, pp. 197–213.

  33. Zhang, J., & Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33, 63–75.

    Article  Google Scholar 

  34. Yu, L., Wang, N., Zhang, W., & Zheng, C. (2007). Deploying a heterogeneous wireless sensor network. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2588–2591.

  35. Kohda, T., & Fujisaki, T. (2001). Jacobian elliptic Chebyshev rational maps. Physica D: Nonlinear Phenomena, 148, 242–254.

    Article  MathSciNet  Google Scholar 

  36. Bergamo, P., D’Arco, P., De Santis, A., & Kocarev, L. (2005). Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I: Regular Papers, 52(7), 1382–1393.

    Article  MathSciNet  Google Scholar 

  37. NS-2—The network simulator version 2.32. [online] http://www.isi.edu/nsnam/ns/. Accessed September 12, 2012.

  38. Bouckaert, S., De Poorter, E., De Mil, P., Moerman, I., & Demeester, P. (2009). Interconnecting wireless sensor and wireless mesh networks: Challenges and strategies. In IEEE Global Telecommunications Conference, 2009, pp. 1–7.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. K. Sandhya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sandhya, M.K., Murugan, K. & Devaraj, P. Selection of aggregator nodes and elimination of false data in wireless sensor networks. Wireless Netw 21, 1327–1341 (2015). https://doi.org/10.1007/s11276-014-0859-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0859-y

Keywords

Navigation