Skip to main content

Advertisement

Log in

HSDA: hybrid communication for secure data aggregation in wireless sensor network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The rapid development of wireless sensor networks motivates the researchers and industries to implement large scale wireless sensor network in highly sensitive applications. Since the data aggregation is the major functionality of the wireless sensor network, the network implementation should avoid data aggregation issues like energy, collision, delay and security. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as authenticity, confidentiality and integrity should be considered. To provide a unique solution that resolve the security and energy issues, this paper proposes a hybrid secure data aggregation (HSDA) to provide high secure data aggregation in an energy efficient way. HSDA implements an end to end symmetric key cryptography for secure authentication using shared public key and it uses hop by hop asymmetric key cryptography with the private keys of each node for data integrity and confidentiality. The proposed model performs the private key generation and encryption at the leaf node to reduce the communication and computation overhead of the sensor nodes. The proposed energy efficient way for achieving the secure data aggregation is proved through simulation results. Compared with existing models, the proposed model provides a new solution that resolves energy as well as security issues in data aggregation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Alzaid, H. & Alfaraj, M. (2008). MASA: End-to-end data security in sensor networks using a mix of asymmetric and symmetric approaches. In: New technologies, mobility and security. NTMS’08. (pp. 1–5). IEEE.

  2. Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In Mobile and ubiquitous systems: networking and services, 2005. MobiQuitous 2005. The Second Annual International Conference on (pp. 109–117). IEEE.

  3. Dhasian, H., & Balasubramanian, P. (2013). Survey of data aggregation techniques using soft computing in wireless sensor networks. Information Security IET, 7(4), 336–342.

    Article  Google Scholar 

  4. Feng, J., Wang, Z., & Henkel, J. (2012). An adaptive data gathering strategy for target tracking in cluster-based wireless sensor networks. In: Computers and Communications (ISCC), 2012 IEEE Symposium on (pp. 000468–000474). IEEE.

  5. Gupta, P., & Kumar, P. R. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2), 388–404.

    Article  MathSciNet  MATH  Google Scholar 

  6. Han, K., Luo, J., Liu, Y., & Vasilakos, A. V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.

    Article  Google Scholar 

  7. Hu, W., Corke, P., Shih, W. C., & Overs, L. (2009) secfleck: A public key technology platform for wireless sensor networks. In: Wireless sensor networks (pp. 296–311). Berlin: Springer

  8. IFerrer, J. D. (1996). A new privacy homomorphism and applications. Information Processing Letters, 60(5), 277–282.

    Article  MathSciNet  Google Scholar 

  9. Jailin, S., Kayalvizhi, R., & Vaidehi, V. (2011). Performance analysis of hybrid cryptography for secured data aggregation in wireless sensor networks. In 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp. 307–312.

  10. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  11. Liu, X. Y., Zhu, Y., Kong, L., Liu, C., Gu, Y., Vasilakos, A. V., & Wu, M. Y. (2014). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197.

    Article  Google Scholar 

  12. Niu, S., Wang, C., Yu, Z., & Cao, S. (2013). Lossy data aggregation integrity scheme in wireless sensor networks. Computers and Electrical Engineering, 39(6), 1726–1735.

    Article  Google Scholar 

  13. Ozdemir, S., & Çam, H. (2010). Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking (TON), 18(3), 736–749.

    Article  Google Scholar 

  14. Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12), 2022–2037.

    Article  MATH  Google Scholar 

  15. Ozdemir, Suat, & Xiao, Yang. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735–1746.

    Article  Google Scholar 

  16. Poornima, A. S., & Amberker, B. B. (2013). Secure end-to-end data aggregation (seeda) protocols for wireless sensor networks. Ad-hoc and Sensor Wireless Networks, 17(3–4), 193–219.

    Google Scholar 

  17. Prasad, N. R., & Alam, M. (2006). Security framework for wireless sensor networks. Wireless Personal Communications, 37(3–4), 455–469.

    Article  Google Scholar 

  18. Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.

    Article  Google Scholar 

  19. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Transactions on Information Forensics and Security, 9(4), 681–694.

    Article  Google Scholar 

  20. Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.

    Article  MathSciNet  Google Scholar 

  21. Setia, S., Roy, S., & Jajodia, S. (2008). Secure data aggregation in wireless sensor networks. Wireless Sensor Network Security, 1, 204–222.

    Google Scholar 

  22. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.

    Article  Google Scholar 

  23. Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems. ACM, pp. 214–226.

  24. Tahir, R., Javed, M. Y., Ahmad, A., & Iqbal, R. (2008). SCUR: Secure Communications in Wireless Sensor Networks using Rabbit. In Proceedings of the World Congress on Engineering, Vol 1, pp. 2–4.

  25. Tseng, Y. C., Pan, M. S., & Tsai, Y. Y. (2006). A distributed emergency navigation algorithm for wireless sensor networks. IEEE Computers, 39(7), 55–62.

    Article  Google Scholar 

  26. Wheeler, A. (2007). Commercial applications of wireless sensor networks using ZigBee. IEEE Communications Magazine, 45(4), 70–77.

    Article  Google Scholar 

  27. Wang, X., Li, J., Peng, X., & Zou, B. (2010). Secure and efficient data aggregation for wireless sensor networks. In Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd (pp. 1–5). IEEE.

  28. Westhoff, D., Girao, J., & Acharya, M. (2006). Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(10), 1417–1431.

    Article  Google Scholar 

  29. Wei, G., Ling, Y., Guo, B., Xiao, B., & Vasilakos, A. V. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Computer Communications, 34(6), 793–802.

    Article  Google Scholar 

  30. Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Du, D. Z., & Vasilakos, A. V. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.

    Article  Google Scholar 

  31. Xu, X., Ansari, R., Khokhar, A., & Vasilakos, A. V. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45.

    Article  Google Scholar 

  32. Xu, X., Li, X. Y., Mao, X., Tang, S., & Wang, S. (2011). A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 163–175.

    Article  Google Scholar 

  33. Yadav, R. B., & Ramaiah, S. S. A Framework: Secure data aggregation in wireless sensor networks.

  34. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  35. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  36. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks.

  37. Yao, Y., Cao, Q., & Vasilakos, A. V. (2013, October). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In Mobile ad-hoc and sensor systems (MASS), 2013 IEEE 10th international conference on IEEE, pp. 182–190.

  38. Yu, B., Li, J., & Li, Y. (2009, April). Distributed data aggregation scheduling in wireless sensor networks. In INFOCOM 2009, IEEE, pp. 2159–2167.

  39. Zhou, Q., Yang, G., & He, L. (2014). An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. International Journal of Distributed Sensor Networks

  40. Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wireless Communications, 22(2), 136–144.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Gopikrishnan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gopikrishnan, S., Priakanth, P. HSDA: hybrid communication for secure data aggregation in wireless sensor network. Wireless Netw 22, 1061–1078 (2016). https://doi.org/10.1007/s11276-015-1122-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1122-x

Keywords

Navigation