SIA: Secure information aggregation in sensor networks
Haowen Chan,Adrian Perrig,Bartosz Przydatek,Dawn Song +3 more
- Vol. 15, Iss: 1, pp 69-102
Reads0
Chats0
TLDR
This work proposes a novel framework for secure information aggregation in sensor networks by constructing efficient random sampling mechanisms and interactive proofs that enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregators and a fraction of the sensor nodes are corrupted.Abstract:
In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication cost of the query. Since the aggregator is on-site, it is vulnerable to physical compromise attacks. A compromised aggregator may report false aggregation results. Hence, it is essential that techniques are available to allow the querier to verify the integrity of the result returned by the aggregator node.
We propose a novel framework for secure information aggregation in sensor networks. By constructing efficient random sampling mechanisms and interactive proofs, we enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregator and a fraction of the sensor nodes are corrupted. In particular, we present efficient protocols for secure computation of the median and average of the measurements, for the estimation of the network size, for finding the minimum and maximum sensor reading, and for random sampling and leader election. Our protocols require only sublinear communication between the aggregator and the user.read more
Citations
More filters
Journal ArticleDOI
A survey of security issues in wireless sensor networks
TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Proceedings ArticleDOI
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
TL;DR: This work presents two privacy-preserving data aggregation schemes for additive aggregation functions that combine clustering protocol and algebraic properties of polynomials, and builds on slicing techniques and the associative property of addition.
Journal ArticleDOI
Securing wireless sensor networks: a survey
TL;DR: A comprehensive survey of WSNSecurity issues that were investigated by researchers in recent years and that shed light on future directions for WSN security are presented.
Journal ArticleDOI
Secure data aggregation in wireless sensor networks: A comprehensive overview
Suat Ozdemir,Yang Xiao +1 more
TL;DR: The relationship between security and data aggregation process in wireless sensor networks is investigated and a taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area.
Proceedings Article
Vanish: increasing data privacy with self-destructing data
TL;DR: Vanish is presented, a system that meets this challenge through a novel integration of cryptographic techniques with global-scale, P2P, distributed hash tables (DHTs) and meets the privacy-preserving goals described above.
References
More filters
Journal ArticleDOI
The knowledge complexity of interactive proof systems
TL;DR: A computational complexity theory of the “knowledge” contained in a proof is developed and examples of zero-knowledge proof systems are given for the languages of quadratic residuosity and 'quadratic nonresiduosity.
Proceedings ArticleDOI
Next century challenges: scalable coordination in sensor networks
TL;DR: This paper believes that localized algorithms (in which simple local node behavior achieves a desired global objective) may be necessary for sensor network coordination.
Journal ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Book ChapterDOI
A Certified Digital Signature
TL;DR: A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system.
Proceedings ArticleDOI
Next century challenges: mobile networking for “Smart Dust”
TL;DR: This work reviews the key elements of the emergent technology of “Smart Dust” and outlines the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.