Enhancement of Concealed Data Aggregation for Multiple Applications to Prevent Vulnerabilities in Wireless Sensor Networks
Data Aggregation is an important aspect in Wireless Sensor Networks WSNs and this is because it reduces the amount of data to be transmitted over the network. This is done by either avoiding the transmission of redundant data or aggregating the result from different sensors and forwarding only the aggregated result further to BS. In previous studies authors used homomorphic encryption properties for concealing communication during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not satisfying multi applications which lead to proposal of CDAMA (Concealed Data Aggregation for Multi Applications). It is designed for multi applications, as it provides secure counting capability and also it reduces the effect of compromising secrets of a single application. In wireless sensor networks or environments the sensor nodes are defenseless and are vulnerable to some attacks. Considering the security aspect of wireless environments we have used Dynamic Intrusion Detection Protocol Model (DYDOG) and a modified key generation procedure that uses Digital Signatures and Two Fish Algorithms along with CDAMA for enhancement of security and throughput. To prove our proposed scheme’s robustness and efficiency, we conducted the simulations, comprehensive analysis and comparisons in the end.
I. Akyildiz,W. Su,Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
R. Min, A. Chandrakasan, “Energy-Efficient Communication for Ad-Hoc Wireless Sensor Networks,” Proc. Conference Record of the 35th Asilomar Conference Signals, Systems and Computers, vol. 1, 2001.
B. Przydatek, D. Song,, A. Perrig, “SIA: Secure Informations Aggregation in Sensor Networks,” Proc. First International Conf. Embedded Network Sensor Systems, pp. 255-265, 2003.
R. Chandramouli, S. Bapatla, and K.P. Subbalakshmi,”Battery power-aware encryption. ACM transactions on information and system security,” pp. 162-180, 2006.
K. Akkaya, M. Demirbas, RS. Aygun, “The Impact Of Data Aggregation on the performance of Wireless Sensor Networks,” wiley wireless Communication Mobile Computing (WCMC), J (8), 171-193, 2008.
Alzaid, H, Foo, E, and Nieto J.G, “Secure data aggregation in wireless sensor network-: a survey,” In the proceedings of the sixth Australasian conference on information security, Volume-81, pp.93-105, 2008.
J. Girao, M. Schneider, and D. Westhoff, “CDA: Concealed Data Aggregation in wireless sensor networks,”Proceedings of the ACM workshop on Wireless Security, 2004.
D. Westhoff, J. Girao, and M. Acharya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
E. Mykletun, J. Girao, and D. Westhoff, “Public Key Based Crypto schemes for Data Concealment in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’06), vol. 5, 2006.
J. Girao, D. Westhoff, M. Schneider, N. Ltd, and G. Heidelberg, “CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’05), vol. 5, 2005.
J. Girao, D. Westhoff, E. Mykletun, and T. Araki, “Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks,” Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007.
C.d. Westhoff, B. Lamparter, and A. Weimerskirch, “on digital signatures in ad hoc networks,” J.Eur.Trans. telecom, vol.16, no. 5, pp. 411-425, 2005.
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. lynn, and P. Kruus, “Sensor networks with public key technology”, in proc. 2nd ACM Workshop Security ad hoc sensor network, pp.59-64, 2004.
C. Karlof, D. Wagner,”Secure routing in wireless sensor networks: Attacks and countermeasures,” in the proc IEEE Int. Workshop Sensor Netw. Protocols Appl., May 2003, pp. 113-127, May 2003.
C. Castelluccia, E. Mykletun and G. Tsudik, “Efficient Aggregation of encrypted data in wireless sensor networks,” Mobile and Ubiquitous Systems: Networking and Services, 2005.
E. Mykletun, J. Girao, and D. Westhoff, "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks", IEEE Int'l Conf. Communications (ICC '06), pp. 2288-2295, 2006.
T.ELGamal, “A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,” CRYPTO,I T-31(4): pp. 469-472, 1985.
H. Cam, S. O¨zdemir, P. Nair, D. Muthuavinashiappan, and H.O. Sanli, “Energy-Efficient Secure Pattern Based Data Aggregation for WSNs,” Computer Comm., vol. - 29, no. - 4, pp. 446-455, 2006.
H. Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference based Data Aggregation Protocol for WSNs,” Proc. IEEE 60th Vehicular Technology Conf. (VTC ’04-fall), vol. 7, 2004.
M. Younis, M.Youssef and K.Arisha,”Energy Aware Routing in Cluster Based Sensor Networks”, in the Proceedings of the 10th IEEE/ACM (MASCOTS2002), Fort Worth, TX , October 2002.
S. Lindsay and C.Raghavendra,”PEGASIS: Power Efficient gathering in Sensor Info. Systems”, international conference on communications, 2001.
J.N. Al-Karaki,et al., “data Aggregation in Wireless Sensor Networks-Exact and approximate algorithms,” Proc IEEE Wks. High Perf. Switching and Routing 2004, phoenix, AZ, Apr.18-21, 2004.
Sanjeev Setia, a. Sankardas Roy and Sushil Jajodi “Secure Data Aggregation in Wireless Sensor Networks” Proc. of 33rd STOC, pp. 266–275, 2001.
N. Koblitz, A. Menezes, S., Vanstone, “State of Elliptic Curve Cryptography,” Designs, Codes & Cryptography, vol. 19, no. 2, pp. 173-193, 2000.
Cryptography and Network Security Principles and practices, William Stallings, Pearson Education, Fifth Edition.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.