SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks

To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by

  • PDF / 711,162 Bytes
  • 15 Pages / 430 x 660 pts Page_size
  • 10 Downloads / 178 Views

DOWNLOAD

REPORT


stract. To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that all nodes in the network send their data to the BS. Security plays a major role in data aggregation process, especially that aggregators are more attractive for attackers than normal nodes, where compromising few aggregators can significantly affect the final result of aggregation. In this paper, we present SAPC, a secure aggregation protocol for cluster-based WSN, which does not rely on trusted aggregator nodes and thus is immune to aggregators compromising. In addition to security performance, SAPC has a low transmission overhead. Keywords: WSN, Cluster-based WSN, Data Aggregation, Security.

1

Introduction

Sensors on a WSN are generally supplied with non-rechargeable and non replaceable batteries [1]. For such sensors, transmitting is much more energy consuming than computing [2] [3]. For instance, transmitting one bit consumes as much energy as performing one thousand CPU cycle operations [2]. As a consequence, the amount of transmitted data must be reduced, in order to extend the lifetime of the network. Aggregation techniques are usually used to reduce the transmission overhead in the network. Aggregation can be seen as the process by which data, during their forwarding from sensors to the BS, are little-by-little merged by sensors called aggregators, to produce smaller output data. The aggregation processing varies from the simple elimination of duplicated data, to the compression of data to smaller size, and mathematical operations over sensed data, like sum, average, min, max, etc. Aggregation aims to reduce the transmission overhead in the network, and consequently to reduce the sensors energy consumption. Several aggregation protocols were introduced for WSN [5] [6] [7] [8]. However, if the aggregation process is not secured, it can be an easy target for H. Zhang et al. (Eds.): MSN 2007, LNCS 4864, pp. 784–798, 2007. c Springer-Verlag Berlin Heidelberg 2007 

SAPC: A Secure Aggregation Protocol

785

attackers. For instance, an attacker can inject false data or modify transmitted data, or more dangerously compromise or claim to be an aggregator, in order to significantly falsify the result of aggregation. The main objective of attacking aggregation process is to produce false aggregation results, and make the BS or the network operator accept false aggregation results, so the wrong decisions and actions are taken. To defeat attacks against aggregation process, several secure aggregation protocols were proposed in the literature [9] [10] [11]. However, these protocols either introduce some heavy communication or computation overheads [11], handle a special kind of aggregation [11], provide a limited resilience a