Abstract
Achieving security in case of data aggregation in wireless sensor network (WSN) is a challenging task because of its limitations in terms of computation, resources, battery power, transmission capabilities, etc. This paper provides a comprehensive discussion on literature of security concerns in data aggregation in WSNs. Main contributions of this paper are describing the fundamentals of secure data aggregation in WSN, identifying the important parameters for the classification of secure data aggregation techniques for WSN, considering key characteristics of existing secure data aggregation techniques, comparing the existing secure data aggregation techniques, and introducing table of comparison based on various parameters such as security principles, prevention of attacks by protocols, aggregation function, and cryptographic techniques used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pathan, A.-S.K., Islam, H.K., Sayeed, S.A., Ahmed, F., Hong, C.S.: A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. Appeared in IEEE ICNEWS (2006)
Chan, H., Perrig, A.: Security and privacy in sensor networks. Carnegie Mellon University, pp. 99–101
Welsh, M., Myung, D., Gaynor, M., Moulton, S.: Resuscitation monitoring with a wireless sensor network. In: Supplement to Circulation. J. Am. Heart Assoc. (2003)
Mainwaring, A., Polastre, J., Szewczyk, R., Culler, R.: Wireless sensor networks for habitat monitoring. In: First ACM International Workshop on Wireless Sensor Networks and Applications (2002)
Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: First European Workshop on Wireless Sensor Networks (EWSN’04) (2004)
Duckworth, G.L., Gilbert, D.C., Barger, J.E.: Acoustic counter-sniper system. In: SPIE International symposium on Enabling Technologies for Law Enforcement and Security (1996)
Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based counter sniper system. In: Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD (2004)
Castillo-Effen, M., Quintela, D.H., Jordan, R., Westhoff, W., Moreno, W.: Wireless sensor networks for flash-flood alerting. In: Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits, and Systems, Dominican Republic (2004)
Gao, T., Greenspan, D., Welsh, M., Juang, R.R., Alm, A.: Vital signs monitoring and patient tracking over a wireless network. In: Proceedings of the 27th IEEE EMBS Annual International Conference (2005)
Lorincz, K., Malan, D., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S.: Sensor networks for emergency response: challenges and opportunities. In: Pervasive Computing for First Response (Special Issue), IEEE Pervasive Computing (2004)
Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy efficient sensor networks. University of Twente, EA Enshede, Netherlands (2002)
Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless communication (2007)
Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL (2003)
Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the ACM MOBIHOC’06, New York, USA, pp. 356–367 (2006)
S. Ozdemir.: Secure and reliable data aggregation for wireless sensor networks. LNCS, volume 4836, pp. 102–109 (2007)
Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5(10), 1417–1431(2006)
Sun, H.M., Lin, Y.H., Hsiao, Y.C., Chen, C.M.: An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. In: Proceedings of ICESS08, pp. 19–26 (2008)
Castellucia, C., Chan, C.F., Mykletum, E., Tsudik, G.: Efficiently provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5(3) (2009)
Ozdemir, S.: Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In: Proceedings of the ICPS’07: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007)
Bahi, J.M., Guyeux, C., Makhoul, A.: Efficient and robust secure aggregation of encrypted data in sensor networks. In: proceedings of Fourth International Conference on Sensor Technologies and Applications, pp. 472–477 (2010)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), pp. 1435–1439 (2003)
Ozdemir, S., Çam, H.: Integration of false data detection with data aggregation and confidential transmission in WSN. IEEE/ACM Trans. Netw. 18(3) (2010)
Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34, 591–597 (2011)
Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011). Elsevier
Ozdemir, S., Xiao, Y.: FTDA: outlier detection based fault tolerant data aggregation for WSN. In: Security and Communication Networks (2012)
Roy, S., Setia, S., Jajodia, S.: Secure data aggregation in WSN. IEEE Trans. Inf. Forensics 7(3), 1040–1052 (2012)
Chen, C.M., Lin, Y.H.: SASHIMI: Secure aggregation via successively hierarchical inspecting of message integrity on WSN. J. Inf. Hiding Multimedia Signal Process. 4(1) (2013)
Hur, J., Lee, Y., Hong, S., Yoon, H.: Trust-based secure aggregation in wireless sensor networks. In: Proceedings: The 3rd International Conference on Computing, Communications and Control Technologies: CCCT (2005)
Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proceedings IEEE SECON’06 (2006)
Perez-Toro, C.R., Panta, R.K., Bagchi, S.: Reputation based resilient data aggregation. In: Proceedings of IEEE SECON (2010)
Farooq, M.U.: Computational intelligence based data aggregation technique for WSN. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, 24–26 Oct, San Francisco, USA (2012)
Bahanfar, S., Kousha, H., Darougaran, L.: Neural network for error detection and data aggregation in WSN. IJCSI 8(5–3) (2011)
Hevin Rajesh, D., Paramasivan, B.: Fuzzy based secure data aggregation technique in WSN. J. Comput. Sci. 8(6), 899–907 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Kumar, M., Dutta, K. (2015). A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_1
Download citation
DOI: https://doi.org/10.1007/978-81-322-2009-1_1
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2008-4
Online ISBN: 978-81-322-2009-1
eBook Packages: EngineeringEngineering (R0)