scispace - formally typeset
Journal ArticleDOI

Secure and efficient verification for data aggregation in wireless sensor networks

TLDR
A scheme that provides the end‐to‐end privacy and allows early detection of the attack through a hop‐by‐hop verification, thus reducing the need to rely entirely on sink node for verification, is proposed and implemented.
Abstract
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the major concerns in WSNs. In order to verify the data, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at sink node, i.e., after reception of aggregate, a detection that is inefficient and leads to a significant loss of legitimate data. In this paper, we propose a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on sink node for verification. Based on an enhanced version of TinyECC, the solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of the scheme for WSNs.

read more

Citations
More filters
Journal ArticleDOI

An Improved IDAF-FIT Clustering Based ASLPP-RR Routing with Secure Data Aggregation in Wireless Sensor Network

TL;DR: In this proposed methodology, the Integration of Distributed Autonomous Fashion with Fuzzy If-then Rules (IDAF-FIT) algorithm is proposed for clustering, and also the Cluster Head (CH) is elected in the meanwhile and the routing concept is initiated.
Journal ArticleDOI

Trust-based neighbor selection using activation function for secure routing in wireless sensor networks

TL;DR: An activation function-based trusted neighbor selection (AF-TNS) for resource-constrained WSNs to enhance network security and improve network performance is proposed.
Journal ArticleDOI

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

TL;DR: This paper categorizes secure data aggregation methods in wireless sensor networks based on network model, network topology, key cryptography technique, encryption method, application, authentication mechanism, and data recovery ability and believes that this taxonomy can help researchers to design secure and efficient data aggregating methods.
Journal ArticleDOI

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

TL;DR: In this article, a secure data aggregation scheme has been proposed, which has three phases: intra-cluster data aggregation, inter-clusters data aggregation and data transfer, and a fuzzy scheduling system is designed to adjust the appropriate data transmission rates of the cluster member nodes.
Journal ArticleDOI

WS3N: Wireless Secure SDN-Based Communication for Sensor Networks

TL;DR: This work’s main contribution is a secure-by-design SDN-based framework for Wireless Sensors Networks, describing its specification, design, implementation, and experiments considering device and protocol constraints.
References
More filters
Proceedings ArticleDOI

TOSSIM: accurate and scalable simulation of entire TinyOS applications

TL;DR: TOSSIM, a simulator for TinyOS wireless sensor networks can capture network behavior at a high fidelity while scaling to thousands of nodes, by using a probabilistic bit error model for the network.

HMAC: Keyed-Hashing for Message Authentication

TL;DR: This document describes HMAC, a mechanism for message authentication using cryptographic hash functions that can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.
Book ChapterDOI

Evaluating 2-DNF formulas on ciphertexts

TL;DR: A homomorphic public key encryption scheme that allows the public evaluation of ψ given an encryption of the variables x1,...,xn and can evaluate quadratic multi-variate polynomials on ciphertexts provided the resulting value falls within a small set.
Book ChapterDOI

TinyOS: An Operating System for Sensor Networks

TL;DR: A qualitative and quantitative evaluation of the TinyOS system is provided, showing that it supports complex, concurrent programs with very low memory requirements and efficient, low-power operation.
Journal ArticleDOI

The Internet of Things vision: Key features, applications and open issues

TL;DR: This paper presents the key features and the driver technologies of IoT, and identifies the application scenarios and the correspondent potential applications, and focuses on research challenges and open issues to be faced for the IoT realization in the real world.
Related Papers (5)