scispace - formally typeset
Open AccessJournal ArticleDOI

SIA: Secure information aggregation in sensor networks

Reads0
Chats0
TLDR
This work proposes a novel framework for secure information aggregation in sensor networks by constructing efficient random sampling mechanisms and interactive proofs that enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregators and a fraction of the sensor nodes are corrupted.
Abstract
In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication cost of the query. Since the aggregator is on-site, it is vulnerable to physical compromise attacks. A compromised aggregator may report false aggregation results. Hence, it is essential that techniques are available to allow the querier to verify the integrity of the result returned by the aggregator node. We propose a novel framework for secure information aggregation in sensor networks. By constructing efficient random sampling mechanisms and interactive proofs, we enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregator and a fraction of the sensor nodes are corrupted. In particular, we present efficient protocols for secure computation of the median and average of the measurements, for the estimation of the network size, for finding the minimum and maximum sensor reading, and for random sampling and leader election. Our protocols require only sublinear communication between the aggregator and the user.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A survey of security issues in wireless sensor networks

TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Proceedings ArticleDOI

PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks

TL;DR: This work presents two privacy-preserving data aggregation schemes for additive aggregation functions that combine clustering protocol and algebraic properties of polynomials, and builds on slicing techniques and the associative property of addition.
Journal ArticleDOI

Securing wireless sensor networks: a survey

TL;DR: A comprehensive survey of WSNSecurity issues that were investigated by researchers in recent years and that shed light on future directions for WSN security are presented.
Journal ArticleDOI

Secure data aggregation in wireless sensor networks: A comprehensive overview

TL;DR: The relationship between security and data aggregation process in wireless sensor networks is investigated and a taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area.
Proceedings Article

Vanish: increasing data privacy with self-destructing data

TL;DR: Vanish is presented, a system that meets this challenge through a novel integration of cryptographic techniques with global-scale, P2P, distributed hash tables (DHTs) and meets the privacy-preserving goals described above.
References
More filters
Journal ArticleDOI

The knowledge complexity of interactive proof systems

TL;DR: A computational complexity theory of the “knowledge” contained in a proof is developed and examples of zero-knowledge proof systems are given for the languages of quadratic residuosity and 'quadratic nonresiduosity.
Proceedings ArticleDOI

Next century challenges: scalable coordination in sensor networks

TL;DR: This paper believes that localized algorithms (in which simple local node behavior achieves a desired global objective) may be necessary for sensor network coordination.
Journal ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Book ChapterDOI

A Certified Digital Signature

TL;DR: A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system.
Proceedings ArticleDOI

Next century challenges: mobile networking for “Smart Dust”

TL;DR: This work reviews the key elements of the emergent technology of “Smart Dust” and outlines the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.
Trending Questions (1)
What is encryption mechanism in sia?

The provided paper does not mention any specific encryption mechanism used in SIA.