{"title":"Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks","authors":"Merad Boudia Omar Rafik, F. Mohammed","doi":"10.1109/INDS.2014.21","DOIUrl":null,"url":null,"abstract":"The detection of false data injection and impersonation attacks is one of the major concern in Wireless Sensor Networks (WSNs). In order to provide security, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at the base station, a detection that can lead to a significant loss of legitimate data. Since the base station is the only place where verification is done, any malicious activities during the data aggregation process can only be detected after the reception of the aggregate, which not only is inefficient but also leads to a considerable data loss rate. In this paper, we present a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on base station for verification. Based on an enhanced and SPA-secure version of Tiny ECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advanced Networking Distributed Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDS.2014.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The detection of false data injection and impersonation attacks is one of the major concern in Wireless Sensor Networks (WSNs). In order to provide security, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at the base station, a detection that can lead to a significant loss of legitimate data. Since the base station is the only place where verification is done, any malicious activities during the data aggregation process can only be detected after the reception of the aggregate, which not only is inefficient but also leads to a considerable data loss rate. In this paper, we present a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on base station for verification. Based on an enhanced and SPA-secure version of Tiny ECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.