Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks

Merad Boudia Omar Rafik, F. Mohammed
{"title":"Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks","authors":"Merad Boudia Omar Rafik, F. Mohammed","doi":"10.1109/INDS.2014.21","DOIUrl":null,"url":null,"abstract":"The detection of false data injection and impersonation attacks is one of the major concern in Wireless Sensor Networks (WSNs). In order to provide security, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at the base station, a detection that can lead to a significant loss of legitimate data. Since the base station is the only place where verification is done, any malicious activities during the data aggregation process can only be detected after the reception of the aggregate, which not only is inefficient but also leads to a considerable data loss rate. In this paper, we present a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on base station for verification. Based on an enhanced and SPA-secure version of Tiny ECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advanced Networking Distributed Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDS.2014.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

The detection of false data injection and impersonation attacks is one of the major concern in Wireless Sensor Networks (WSNs). In order to provide security, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at the base station, a detection that can lead to a significant loss of legitimate data. Since the base station is the only place where verification is done, any malicious activities during the data aggregation process can only be detected after the reception of the aggregate, which not only is inefficient but also leads to a considerable data loss rate. In this paper, we present a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on base station for verification. Based on an enhanced and SPA-secure version of Tiny ECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.
无线传感器网络中有效的隐藏数据聚合与验证
虚假数据注入和模拟攻击的检测是无线传感器网络(WSNs)的主要问题之一。为了提供安全性,可以采用端到端方法或逐跳方法。在前一种情况下,这些攻击的检测只能在基站上执行,这种检测可能导致合法数据的严重丢失。由于基站是唯一进行验证的地方,所以在数据聚合过程中,任何恶意活动都只能在接收到聚合后才能被检测到,这不仅效率低下,而且会导致相当大的数据丢失率。在本文中,我们提出了一种方案,提供端到端隐私,并允许通过逐跳验证早期检测攻击,从而减少了完全依赖基站进行验证的需要。基于增强的spa安全版本的Tiny ECC,我们的解决方案在MicaZ和TelosB上实现。通过仿真和实验结果,证明了该方案在无线传感器网络中的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信