Reference Hub4
Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks

Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks

Vivaksha Jariwala, Himanshu Patel, Parth Patel, Devesh C. Jinwala
Copyright: © 2014 |Volume: 5 |Issue: 3 |Pages: 23
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781466653696|DOI: 10.4018/ijdst.2014070104
Cite Article Cite Article

MLA

Jariwala, Vivaksha, et al. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks." IJDST vol.5, no.3 2014: pp.77-99. http://doi.org/10.4018/ijdst.2014070104

APA

Jariwala, V., Patel, H., Patel, P., & Jinwala, D. C. (2014). Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks. International Journal of Distributed Systems and Technologies (IJDST), 5(3), 77-99. http://doi.org/10.4018/ijdst.2014070104

Chicago

Jariwala, Vivaksha, et al. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks," International Journal of Distributed Systems and Technologies (IJDST) 5, no.3: 77-99. http://doi.org/10.4018/ijdst.2014070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is based on a zero configuration protocol that supports a generation of a defined aggregation topology and a key exchange procedure. This work supports the framework with detailed security analysis and performance evaluation on TinyOS platform using TOSSIM as the base simulator. Through humble observations, this is an unique attempt that integrates the support for security features, topology generation and key management in a single, secure data aggregation protocol; substantiating the proposal with elaborate experimental evaluation, too.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.