Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
Vivaksha Jariwala,
Himanshu Patel,
Parth Patel and
Devesh C. Jinwala
Additional contact information
Vivaksha Jariwala: Computer Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India
Himanshu Patel: Computer Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India
Parth Patel: Software Engineer, Aryaka Networks, Bangalore, India
Devesh C. Jinwala: Computer Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India
International Journal of Distributed Systems and Technologies (IJDST), 2014, vol. 5, issue 3, 77-99
Abstract:
Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is based on a zero configuration protocol that supports a generation of a defined aggregation topology and a key exchange procedure. This work supports the framework with detailed security analysis and performance evaluation on TinyOS platform using TOSSIM as the base simulator. Through humble observations, this is an unique attempt that integrates the support for security features, topology generation and key management in a single, secure data aggregation protocol; substantiating the proposal with elaborate experimental evaluation, too.
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/ijdst.2014070104 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jdst00:v:5:y:2014:i:3:p:77-99
Access Statistics for this article
International Journal of Distributed Systems and Technologies (IJDST) is currently edited by Nik Bessis
More articles in International Journal of Distributed Systems and Technologies (IJDST) from IGI Global
Bibliographic data for series maintained by Journal Editor ().