Skip to main content

A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 309))

Abstract

Achieving security in case of data aggregation in wireless sensor network (WSN) is a challenging task because of its limitations in terms of computation, resources, battery power, transmission capabilities, etc. This paper provides a comprehensive discussion on literature of security concerns in data aggregation in WSNs. Main contributions of this paper are describing the fundamentals of secure data aggregation in WSN, identifying the important parameters for the classification of secure data aggregation techniques for WSN, considering key characteristics of existing secure data aggregation techniques, comparing the existing secure data aggregation techniques, and introducing table of comparison based on various parameters such as security principles, prevention of attacks by protocols, aggregation function, and cryptographic techniques used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pathan, A.-S.K., Islam, H.K., Sayeed, S.A., Ahmed, F., Hong, C.S.: A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. Appeared in IEEE ICNEWS (2006)

    Google Scholar 

  2. Chan, H., Perrig, A.: Security and privacy in sensor networks. Carnegie Mellon University, pp. 99–101

    Google Scholar 

  3. Welsh, M., Myung, D., Gaynor, M., Moulton, S.: Resuscitation monitoring with a wireless sensor network. In: Supplement to Circulation. J. Am. Heart Assoc. (2003)

    Google Scholar 

  4. Mainwaring, A., Polastre, J., Szewczyk, R., Culler, R.: Wireless sensor networks for habitat monitoring. In: First ACM International Workshop on Wireless Sensor Networks and Applications (2002)

    Google Scholar 

  5. Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: First European Workshop on Wireless Sensor Networks (EWSN’04) (2004)

    Google Scholar 

  6. Duckworth, G.L., Gilbert, D.C., Barger, J.E.: Acoustic counter-sniper system. In: SPIE International symposium on Enabling Technologies for Law Enforcement and Security (1996)

    Google Scholar 

  7. Simon, G., Maroti, M., Ledeczi, A., Balogh, G., Kusy, B., Nadas, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based counter sniper system. In: Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD (2004)

    Google Scholar 

  8. Castillo-Effen, M., Quintela, D.H., Jordan, R., Westhoff, W., Moreno, W.: Wireless sensor networks for flash-flood alerting. In: Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits, and Systems, Dominican Republic (2004)

    Google Scholar 

  9. Gao, T., Greenspan, D., Welsh, M., Juang, R.R., Alm, A.: Vital signs monitoring and patient tracking over a wireless network. In: Proceedings of the 27th IEEE EMBS Annual International Conference (2005)

    Google Scholar 

  10. Lorincz, K., Malan, D., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S.: Sensor networks for emergency response: challenges and opportunities. In: Pervasive Computing for First Response (Special Issue), IEEE Pervasive Computing (2004)

    Google Scholar 

  11. Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy efficient sensor networks. University of Twente, EA Enshede, Netherlands (2002)

    Google Scholar 

  12. Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless communication (2007)

    Google Scholar 

  13. Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL (2003)

    Google Scholar 

  14. Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the ACM MOBIHOC’06, New York, USA, pp. 356–367 (2006)

    Google Scholar 

  15. S. Ozdemir.: Secure and reliable data aggregation for wireless sensor networks. LNCS, volume 4836, pp. 102–109 (2007)

    Google Scholar 

  16. Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5(10), 1417–1431(2006)

    Google Scholar 

  17. Sun, H.M., Lin, Y.H., Hsiao, Y.C., Chen, C.M.: An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. In: Proceedings of ICESS08, pp. 19–26 (2008)

    Google Scholar 

  18. Castellucia, C., Chan, C.F., Mykletum, E., Tsudik, G.: Efficiently provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5(3) (2009)

    Google Scholar 

  19. Ozdemir, S.: Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism. In: Proceedings of the ICPS’07: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007)

    Google Scholar 

  20. Bahi, J.M., Guyeux, C., Makhoul, A.: Efficient and robust secure aggregation of encrypted data in sensor networks. In: proceedings of Fourth International Conference on Sensor Technologies and Applications, pp. 472–477 (2010)

    Google Scholar 

  21. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), pp. 1435–1439 (2003)

    Google Scholar 

  22. Ozdemir, S., Çam, H.: Integration of false data detection with data aggregation and confidential transmission in WSN. IEEE/ACM Trans. Netw. 18(3) (2010)

    Google Scholar 

  23. Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34, 591–597 (2011)

    Article  Google Scholar 

  24. Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55, 1735–1746 (2011). Elsevier

    Article  Google Scholar 

  25. Ozdemir, S., Xiao, Y.: FTDA: outlier detection based fault tolerant data aggregation for WSN. In: Security and Communication Networks (2012)

    Google Scholar 

  26. Roy, S., Setia, S., Jajodia, S.: Secure data aggregation in WSN. IEEE Trans. Inf. Forensics 7(3), 1040–1052 (2012)

    Article  Google Scholar 

  27. Chen, C.M., Lin, Y.H.: SASHIMI: Secure aggregation via successively hierarchical inspecting of message integrity on WSN. J. Inf. Hiding Multimedia Signal Process. 4(1) (2013)

    Google Scholar 

  28. Hur, J., Lee, Y., Hong, S., Yoon, H.: Trust-based secure aggregation in wireless sensor networks. In: Proceedings: The 3rd International Conference on Computing, Communications and Control Technologies: CCCT (2005)

    Google Scholar 

  29. Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proceedings IEEE SECON’06 (2006)

    Google Scholar 

  30. Perez-Toro, C.R., Panta, R.K., Bagchi, S.: Reputation based resilient data aggregation. In: Proceedings of IEEE SECON (2010)

    Google Scholar 

  31. Farooq, M.U.: Computational intelligence based data aggregation technique for WSN. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, 24–26 Oct, San Francisco, USA (2012)

    Google Scholar 

  32. Bahanfar, S., Kousha, H., Darougaran, L.: Neural network for error detection and data aggregation in WSN. IJCSI 8(5–3) (2011)

    Google Scholar 

  33. Hevin Rajesh, D., Paramasivan, B.: Fuzzy based secure data aggregation technique in WSN. J. Comput. Sci. 8(6), 899–907 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mukesh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Kumar, M., Dutta, K. (2015). A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2009-1_1

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2008-4

  • Online ISBN: 978-81-322-2009-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics