Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Data Aggregation in WSN using Synopsis Diffusion


Affiliations
1 Department of Electronics and Communication Engineering, Paavai Engineering College, India
2 Department of Electronics and Communication Engineering, Sona College of Technology, India
     

   Subscribe/Renew Journal


In a wireless sensor network, a sensor node is severely constrained in terms of communication bandwidth, computation capability and energy reserves. To reduce energy consumption and the amount of communication, many systems also perform in-network data aggregation. A resilient aggregation framework called synopsis diffusion approach which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates, such as Count and Sum in spite of message losses resulting from node and transmission failures. Consequently, these systems are vulnerable to wide variety of attacks. In particular we consider two major attacks called false sub aggregate and wormhole attack. In this paper, the synopsis diffusion approach secure against attacks was provide by designing a novel light weight verification algorithm which can be used by the base station to determine the attacks and also the falsified value. The performance was evaluated via both analysis and extensive simulation study which shows that our verification algorithm outperforms other existing approaches.

Keywords

Light Weight Verification, WSN, Synopsis Diffusion.
Subscription Login to verify subscription
User
Notifications
Font Size

  • S. Roy, M. Conti, S. Setia and S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attackers Impact”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 4, pp. 681-694, 2014.
  • H. Yu, “Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks Via Set Sampling”, Distributed Computing, Vol. 23, pp. 373-394, 2011.
  • He Ronghui, Ma Guoqing, Wang Chunlei, and Fang Lan, “Detecting and Locating Wormhole Attacks in Wireless Sensor Networks using Beacon Nodes”, World Academy of Science, Engineering and Technology, Vol. 2, No. 7, pp. 1741-1746, 2009.
  • G. Kiruthiga and M. Mohanapriya, “An Adaptive Signal Strength Based Localization Approach for Wireless Sensor Networks”, Cluster Computing, Vol. 22, No. 5, pp. 10439-10448, 2019.
  • G. Kiruthiga, K. Kalaiselvi, R.S. Shudapreyaa and V. Dineshbabu, “Detection of Faults in Flying Wireless Sensor Networks using Adaptive Reinforcement Learning”, International Journal of Recent Technology and Engineering, Vol. 8, No. 4, pp. 761-763, 2019.
  • Ritesh Maheshwari, Jie Gao and Samir R. Das, “Detecting Wormhole Attacks in Wireless Networks using Connectivity Information”, Proceedings of IEEE International Conference on Computer Communications, pp. 6-12, 2007.
  • M. Garofalakis, J.M. Hellerstein and P. Maniatis, “Proof Sketches: Verifiable in Network Aggregation”, Proceedings of 23rd IEEE International Conference on Data Engineering, pp. 132-136, 2007.
  • H. Chan, A. Perrig and D. Song, “Secure Hierarchical in-Network Aggregation in Sensor Networks”, Proceedings of 13th ACM Conference on Computer and Communications Security, pp. 278-287, 2006.
  • L. Buttyan, P. Schaffer and I. Vajda, “Resilient Aggregation with Attack Detection in Sensor Networks”, Proceedings of 2nd ACM Conference on Sensor Networks and Systems for Pervasive Computing, pp. 331-336, 2006.
  • Y. Yang, X. Wang, S. Zhu and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks”, Proceedings of 7th ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 889-893, 2006.
  • D. Wagner, “Resilient Aggregation in Sensor Networks”, Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 78-87, 2004.
  • J. Considine, F. Li, G. Kollios and J. Byers, “Approximate Aggregation Techniques for Sensor Databases”, Proceedings of IEEE International Conference on Data Engineering, pp. 345-354, 2004.

Abstract Views: 568

PDF Views: 0




  • Secure Data Aggregation in WSN using Synopsis Diffusion

Abstract Views: 568  |  PDF Views: 0

Authors

S. Vimalnath
Department of Electronics and Communication Engineering, Paavai Engineering College, India
G. Ravi
Department of Electronics and Communication Engineering, Sona College of Technology, India

Abstract


In a wireless sensor network, a sensor node is severely constrained in terms of communication bandwidth, computation capability and energy reserves. To reduce energy consumption and the amount of communication, many systems also perform in-network data aggregation. A resilient aggregation framework called synopsis diffusion approach which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates, such as Count and Sum in spite of message losses resulting from node and transmission failures. Consequently, these systems are vulnerable to wide variety of attacks. In particular we consider two major attacks called false sub aggregate and wormhole attack. In this paper, the synopsis diffusion approach secure against attacks was provide by designing a novel light weight verification algorithm which can be used by the base station to determine the attacks and also the falsified value. The performance was evaluated via both analysis and extensive simulation study which shows that our verification algorithm outperforms other existing approaches.

Keywords


Light Weight Verification, WSN, Synopsis Diffusion.

References