skip to main content
10.1145/958491.958521acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
Article

SIA: secure information aggregation in sensor networks

Published:05 November 2003Publication History

ABSTRACT

Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensor nodes often have limited computation and communication resources and battery power. Moreover, in many applications sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the sensor's cryptographic keys.One of the basic and indispensable functionalities of sensor networks is the ability to answer queries over the data acquired by the sensors. The resource constraints and security issues make designing mechanisms for information aggregation in large sensor networks particularly challenging.In this paper, we propose a novel framework for secure information aggregation in large sensor networks. In our framework certain nodes in the sensor network, called aggregators, help aggregating information requested by a query, which substantially reduces the communication overhead. By constructing efficient random sampling mechanisms and interactive proofs, we enable the user to verify that the answer given by the aggregator is a good approximation of the true value even when the aggregator and a fraction of the sensor nodes are corrupted. In particular, we present efficient protocols for secure computation of the median and the average of the measurements, for the estimation of the network size, and for finding the minimum and maximum sensor reading. Our protocols require only sublinear communication between the aggregator and the user. To the best of our knowledge, this paper is the first on secure information aggregation in sensor networks that can handle a malicious aggregator and sensor nodes.

References

  1. Noga Alon, Yossi Matias, and Mario Szegedy. The space complexity of approximating the frequency moments. In Proc. 28th STOC, pages 20--29, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. László Babai, Lance Fortnow, Leonid A. Levin, and Mario Szegedy. Checking computations in polylogarithmic time. In Proc. 23rd ACM STOC, pages 21--32, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ziv Bar-Yossef, S. Ravi Kumar, and D. Sivakumar. Sampling algorithms: lower bounds and applications. In Proc. 33rd STOC, pages 266--275, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ziv Bar-Yossef, T. S. Jayram, Ravi Kumar, D. Sivakumar, and Luca Trevisan. Counting distinct elements in a data stream. In Proc. RANDOM 2002, pages 1--10, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology -- CRYPTO '96, pages 1--15, 1996.]] Google ScholarGoogle Scholar
  6. Mihir Bellare and Bennet Yee. Forward security in private key cryptography. Report 2001035, Cryptology ePrint Archive, 2001.]]Google ScholarGoogle Scholar
  7. Christian Cachin, Silvio Micali, and Markus Stadler. Computationally private information retrieval with polylogarithmic communication. In Proc. Eurocrypt'99, pages 402--414, 1999.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. Ran Canetti, Guy Even, and Oded Goldreich. Lower bounds for sampling algorithms for estimating the average. Information Processing Letters, 53(1):17--25, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Moses Charikar, Surajit Chaudhuri, Rajeev Motwani, and Vivek Narasayya. Towards estimation error guarantees for distinct values. In Proc. 19th PODS, pages 268--279, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Amol Deshpande, Suman Nath, Phillip B. Gibbons, and Srinivasan Seshan. Cache-and-query for wide area sensor databases. In SIGMOD 2003, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Funda Ergün, Sampath Kannan, S. Ravi Kumar, Ronitt Rubinfeld, and Mahesh Viswanathan. Spot-checkers. JCSS, 60:717--751, 2000. preliminary version in Proc. STOC'98.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Funda Ergün, Ravi Kumar, and Ronitt Rubinfeld. Fast approximate PCPs. In Proc. 31st STOC, pages 41--50, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Deborah Estrin, Ramesh Govindan, John Heidemann, and Satish Kumar. Next century challenges: Scalable coordination in sensor networks. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom 99, August 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Flajolet and G. N. Martin. Probabilistic counting. In Proc. FOCS'83, pages 76--82, 1983.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lingxuan Hu and David Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad hoc Networks, January 2003.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann. Impact of network density on data aggregation in wireless sensor networks. In Proceedings of International Conference on Distributed Computing Systems, November 2001.]]Google ScholarGoogle Scholar
  17. J. M. Kahn, R. H. Katz, and K. S. Pister. Mobile networking for smart dust. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom 99, Seattle, WA, August 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Aggelos Kiayias and Moti Yung. Secure games with polynomial expressions. In Proc. 28th ICALP, pages 939--950, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Joe Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In Proc. 24th ACM STOC, pages 723--732, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3):382--401, July 1982.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. TAG: a Tiny AGgregation service for ad-hoc sensor networks. In Proceedings of the Fith Annual Symposium on Operating Systems Design and Implementation (OSDI), December 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ralph C. Merkle. Protocols for public key cryptosystems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 122--134, April 1980.]]Google ScholarGoogle ScholarCross RefCross Ref
  23. Ralph C. Merkle. A certified digital signature. In Proc. Crypto'89, pages 218--238, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(Summer), 2002.]]Google ScholarGoogle Scholar
  25. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks Journal (WINET), 8(5):521--534, September 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Mark N. Wegman and J. Lawrence Carter. New hash functions and their use in authentication and set equality. JCSS, 22:265--279, 1981.]]Google ScholarGoogle ScholarCross RefCross Ref
  27. Jerry Zhao, Ramesh Govindan, and Deborah Estrin. Computing aggregates for monitoring wireless sensor networks. In First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. SIA: secure information aggregation in sensor networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
        November 2003
        356 pages
        ISBN:1581137079
        DOI:10.1145/958491

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 November 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        SenSys '03 Paper Acceptance Rate24of137submissions,18%Overall Acceptance Rate174of867submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader