SPEEDA: A Secure Protocol and Energy Efficient for Data Aggregation in Wireless Sensor Networks

  • Authors

    • Sarah Wayzani
    • Chérif Diallo
    2018-11-28
    https://doi.org/10.14419/ijet.v7i4.20.27422
  • Wireless Sensor Network (WSN), Security, Aggregation, Routing, SPEEDA.
  • Wireless Sensor Networks (WSN) consists of a set of small and resources-constrained devices. They have received much attention over the last few years for the study and development of a plethora of potential applications. However, the common denominator of all applications of these sensor networks is the vulnerability of micro-sensors because of their limited material resources the most constraining of which is energy. In fact, wireless sensors are limited in terms of calculation, storage, battery, etc. Therefore, every possible solution that aims to conserve these resources is extensively sought. Thus, a great deal of researches has been conducted leading to an effective technique answering the established problem. This solution concerns the aggregation of data which is one of the techniques that is actually considered as an essential paradigm for sensor networks since it tends to save computation and communication resources. Data aggregation allows in-network processing which leads to lesser packet transmissions and reduces redundancy, and therefore, helps in increasing network’s overall lifetime. However, sensor networks are usually deployed in unattended and hostile environments.

    Thus, the designer should not only consider the limited resources of the sensor nodes but also the security threats that can occur in an easily accessible network to the attacker. In this paper, we will give an overview study of the existing data aggregation solutions in wireless sensor networks then, we will propose a new efficient and secure approach to aggregation which can be evaluated with specific criteria.

     


     
  • References

    1. [1] Diallo, C. (2017), Deployment Strategies and Clustering Protocols Efficiency. In Sensors & Transducers, Vol. 213, Issue 6, June 2017, pp. 9-23, [International Journal ISSN: 2306-8515, e-ISSN: 1726-5479].

      [2] Diallo, C., Sawaré, A., Sow, M., T. (2017), Security Issues and Solutions in Wireless Sensor Networks. In International Journal of Computer Science and Information Security, IJCSIS, ISSN 1947-5500, VOL.15 No.3, March 2017.

      [3] Diallo, C. (2017), Security Issues and Solutions related to Data Aggregation Process in WSN. In International Journal of Computer Science and Network Security, IJCSNS, ISSN 1738-7905, VOL.17 No.4, pp.59-71, April 2017.

      [4] B. Przydatek, D. X. Song, and A. Perrig. SIA (2003), Secure Information Aggregation in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys’03, Los Angeles, California, USA, pp. 255-265, Nov. 2003

      [5] A. Mahimkar and T. S. Rappaport. SecureDAV (2004), A secure data aggregation and verification protocol for sensor networks. In Proceedings of the Global Telecommunications Conference (Globecom’04), Dallas, USA, vol. 4, pp 2175-2179, Nov. 2004.

      [6] H. O. Sanli, S. Ozdemir, and H. Cam. SRDA (2004), Secure reference-based data aggregation protocol for wireless sensor networks. In Proceeding of the 60th IEEE Vehicular Technology Conference, VTC’04, Los Angeles, USA, vol. 7, pp. 4650-4654, Sept. 2004.

      [7] L. Hu and D. Evans (2003), Secure aggregation for wireless network. In Proceedings of the 2003 Symposium on Applications and the Internet Workshops, SAINT’03, Orlando, FL, USA, pp. 384-394, Jan. 2003

      [8] P. Jadia and A. Mathuria (2004), Efficient secure aggregation in sensor networks. In Proceedings of the 11th conference on High Performance Computing, HiPC’04, Banga-lore, India, vol. 3296 of Lecture Notes in Computer Science, pp. 40-49. Springer, Dec. 2004

      [9] D. Westhoff, J. Girao, and M. Acharya (2006), Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(10):1417-1431, 2006.

      [10] Y. Yang, x. Wang, S. Zhu, and G. Cao (2008), SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In ACM Transactions on Information and Systems Security, Vol. 11, No. 4, Article 18, July 2008.

      [11] F. E. Grubbs (1969), Procedures for detecting outlying observations in samples. Techno metrics, 11(1):1-21, 1969.

      [12] H. Chan, A. Perrig, and D. Song (2006), Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS’06, pp. 278-287, New York, NY, USA, 2006.

      [13] H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, and H. O. Sanli (2006), Energy efficient secure pattern based data aggregation for wireless sensor networks. Comput. Commun. 29(4):446-455, Feb. 2006.

      [14] S. Ozdemir (2007), Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. IEEE, 8 2007.

      [15] J. Girao, D. Westhoff, and M. Schneider (2005), Cda: Concealed data aggregation for reverse multicast trafic in wireless sensor networks. In IEEE International Conference on Communications (ICC2005), Seoul, Korea, May 2005.

      [16] M. Onen and R. Molva (2007), Secure data aggregation with multiple encryption. In Koen Langendoen and Thiemo Voigt, editors, EWSN, vol. 4373 of Lecture Notes in Computer Science, pp. 117-132. Springer, 2007.

      [17] L. Eschenauer and V. D. Gligor (2002), A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pp. 41-47, 2002

      [18] H. Chan, A. Perrig, and D. Song (2003), Random key predistribution schemes for sensor networks. In Proceedings of the Symposium on Security and Privacy, pp. 197–213, IEEE, 2003.

      [19] Manjeswar, A. Agrawal, D.P (2007), APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. In Proceedings of 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, Fort Lauderdale, FL, USA, Apr. 2002; pp. 195-202

      [20] Sow, M., T., Diallo, C. (2017), Energy over-consumption induced by securing network operations. Proceedings of 2nd IEEE International Conference on Frontiers of Sensors Technologies (IEEE-ICFST 2017), Shenzhen, China, Apr. 2017, ISBN: 978-1-5090-4858-8/17/ c 2017 IEEE, pp. 154- 160 (2017)

      [21] Diallo, C., Sow, M., T. (2017), LQI-DCPSec: Secure Distributed d-Cluster Formation in Wireless Sensor Networks. In Proceedings of the 10th EAI International Wireless Internet Conference, WiCON 2017, Tianjin, China, December 2017. Published by Springer.

  • Downloads

  • How to Cite

    Wayzani, S., & Diallo, C. (2018). SPEEDA: A Secure Protocol and Energy Efficient for Data Aggregation in Wireless Sensor Networks. International Journal of Engineering & Technology, 7(4.20), 598-605. https://doi.org/10.14419/ijet.v7i4.20.27422