skip to main content
10.1145/1180345.1180355acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Attack-resilient hierarchical data aggregation in sensor networks

Published: 30 October 2006 Publication History

Abstract

In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communication and hence the energy consumed. Recently several researchers have proposed robust aggregation frameworks, which combine multi-path routing schemes with duplicate-insensitive algorithms, to accurately compute aggregates (e.g., Sum, Count, Average) in spite of message losses resulting from node and transmission failures. However, these aggregation frameworks have been designed without security in mind. Given the lack of hardware support for tamper-resistance and the unattended nature of sensor nodes, sensor networks are highly vulnerable to node compromises. We show that even if a few compromised nodes contribute false sub-aggregate values, this results in large errors in the aggregate computed at the root of the hierarchy. We present modifications to the aggregation algorithms that guard against such attacks, i.e., we present algorithms for resilient hierarchical data aggregation despite the presence of compromised nodes in the aggregation hierarchy. We evaluate the performance and costs of our approach via both analysis and simulation. Our results show that our approach is scalable and efficient.

References

[1]
M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In Proc. of the 15th Annual International Cryptology Conference on Advances in Cryptology - CRYPTO'95, pages 15--28, 1995.]]
[2]
L. Buttyan, P. Schaffer, and I. Vajda. Resilient aggregation with attack detection in sensor networks. In Proc. of 2nd IEEE Workshop on Sensor Networks and Systems for Pervasive Computing, 2006.]]
[3]
J. Considine, F. Li, G. Kollios, and J. Byers. Approximate aggregation techniques for sensor databases. In Proc. of IEEE Int'l Conf. on Data Engineering (ICDE), 2004.]]
[4]
W. Du, J. Deng, Y. S. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '03)., 2003.]]
[5]
P. Flajolet and G. N. Martin. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences, 31(2):182--209, 1985.]]
[6]
S. Ganeriwal and M. B. Sribastava. Reputation-based framework for highly integrity sensor networks. In Proc. of ACM Workshop on Security of Sensor and Adhoc Networks (SASN), Washington, DC, 2004.]]
[7]
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient energy-efficient multipath routing in wireless sensor networks. Mobile Comuting and Communication Review, 4(5):11--25, 2001.]]
[8]
L. Hu and D. Evans. Secure aggregation for wireless networks. In Proc. of Workshop on Security and Assurance in Ad hoc Networks., 2003.]]
[9]
M. Jelasity, A. Montresor, and O. Babaoglu. Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems, 23(3):219--252, 2005.]]
[10]
F. Koushanfar, M. Potkonjak, and A. Sangiovanni-Vincentelli. Fault tolerance techniques in wireless ad-hoc sensor networks. In Sensors 2002. Proceedings of IEEE, pages 1491--1496.]]
[11]
S. Madden, M. J. Franklin, J.M. Hellerstein, and W. Hong. TAG: A tiny aggregation service for ad hoc sensor networks. In Proc. of 5th USENIX Symposium on Operating Systems Design and Implementation, 2002.]]
[12]
A. Manjhi, S. Nath, and P. Gibbons. Tributeries and deltas: Efficient and robust aggregation in sensor network streams. In Proc. of ACM International Conference on Management of Data (SIGMOD), 2005.]]
[13]
Mica Motes. http://www.xbow.com.]]
[14]
S. Nath, P. B. Gibbons, S. Seshan, and Z. Anderson. Synopsis diffusion for robust aggregation in sensor networks. In Proc. of the 2nd international conference on Embedded networked sensor systems (SenSys), 2004.]]
[15]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM), 2001.]]
[16]
B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In Proc. of the 1st international conference on Embedded networked sensor systems (SenSys), 2003.]]
[17]
D. Wagner. Resilient aggregation in sensor networks. In Proc. of ACM Workshop on Security of Sensor and Adhoc Networks (SASN), 2004.]]
[18]
Y. Yang, X. Wang, S. Zhu, and G. Cao. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proc. of ACM MOBIHOC, 2006.]]
[19]
Y. Yao and J. E. Gehrke. The cougar approach to in-network query processing in sensor networks. ACM SIGMOD Record, 31(2):9--18, September 2002.]]
[20]
Fan Ye, Haiyun Luo, Songwu Lu, and Lixia Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proc. of IEEE Infocom, 2004.]]
[21]
W. Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. Proc. of IEEE Infocom, 2005.]]
[22]
J. Zhao and R. Govindan. Understanding packet delivery performance in dense wireless sensor networks. In Proc. of the 1st international conference on Embedded networked sensor systems (SenSys), 2003.]]
[23]
J. Zhao, R. Govindan, and D. Estrin. Computing aggregates for monitoring sensor networks. In Proc. of the 2nd IEEE International Workshop on Sensor Network Protocols and Applications, 2003.]]
[24]
S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '03)., 2003.]]
[25]
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering injected false data in sensor networks. In Proc. of IEEE Symposium on Security and Privacy, 2004.]]

Cited By

View all
  • (2024)A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied TechniquesACM Computing Surveys10.1145/365994456:12(1-36)Online publication date: 20-Apr-2024
  • (2021)SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks2021 17th International Conference on Mobility, Sensing and Networking (MSN)10.1109/MSN53354.2021.00074(454-461)Online publication date: Dec-2021
  • (2021)Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networksFrontiers of Computer Science10.1007/s11704-021-9460-615:6Online publication date: 3-Aug-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
October 2006
186 pages
ISBN:1595935541
DOI:10.1145/1180345
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack-resilient
  2. data aggregation
  3. hierarchical aggregation
  4. sensor network security
  5. synopsis diffusion

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied TechniquesACM Computing Surveys10.1145/365994456:12(1-36)Online publication date: 20-Apr-2024
  • (2021)SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks2021 17th International Conference on Mobility, Sensing and Networking (MSN)10.1109/MSN53354.2021.00074(454-461)Online publication date: Dec-2021
  • (2021)Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networksFrontiers of Computer Science10.1007/s11704-021-9460-615:6Online publication date: 3-Aug-2021
  • (2016)Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics, and Design PrinciplesCyber Security for Industrial Control Systems10.1201/b19629-9(151-182)Online publication date: 31-Mar-2016
  • (2016)A secure expansive aggregation in Wireless Sensor Networks for linear infrasturcture2016 IEEE Region 10 Symposium (TENSYMP)10.1109/TENCONSpring.2016.7519406(207-212)Online publication date: May-2016
  • (2016)SADA: Secure approximate data aggregation in wireless sensor networks2016 International Conference on Data Science and Engineering (ICDSE)10.1109/ICDSE.2016.7823942(1-6)Online publication date: Aug-2016
  • (2015)SAR protocol based secure data aggregation in wireless sensor network2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO)10.1109/ISCO.2015.7282321(1-6)Online publication date: Jan-2015
  • (2015)Survey on Secure Data Aggregation in Wireless Sensor NetworksProceedings of the 2015 International Conference on Computing Communication Control and Automation10.1109/ICCUBEA.2015.52(242-246)Online publication date: 26-Feb-2015
  • (2014)Secure Data Aggregation in Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2014.23071979:4(681-694)Online publication date: 1-Apr-2014
  • (2014)Confidential aggregation for wireless transmissionsThe International Conference on Information Networking 2014 (ICOIN2014)10.1109/ICOIN.2014.6799711(390-394)Online publication date: Feb-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media