Study on Mechanisms of Secure Data Aggregation Based on Weighted Fitting Analysis
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [10]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Cryptographic approaches are vulnerable to impersonation attacks when nodes become compromised. Meanwhile, trust-based judgment and confirmation of cluster heads in WSN imposes higher communication cost. Trust management and authentication on cluster heads in WSN are essential in research on the mechanisms of secure data aggregation at present. In this paper, an energy attenuation model is adopted to describe event sensing in a kind of WSNs. Approximate evaluation on distance between occurring event and nodes within a cluster is achieved in case the location of the event is not known. Distribution properties of data points with clustering characteristics based on fitting curve construction are theoretically analyzed. In addition, the mechanism on trust authentication on cluster heads is also refined. Experimental results show that the proposed mechanism has much better performance on fitting accuracy and malicious CH recognition than previous works.

    Reference
    [1] Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: A comprehensive overview. IEEE Trans. on Computer Networks, 2009,53:2022-2037.
    [2] Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: A scalable and robust communication paradigm for sensor networks. ACM SIGPLAN Notices, 2000, 56-67.
    [3] Zhao J, Govindan R, Estrin D. Computing aggregates for monitoring wireless sensor networks. Sensor Network Protocols and Applications, 2003, 139-148.
    [4] Mahimkar A, Rappaport TS. Secure DAV: A secure data aggregation and verification protocol for wireless sensor networks. In: Proc. of the 47 th IEEE Global Telecommunications Conf. (Globecom). Dallas, 2004.
    [5] Cam H, Ozdemir S, Muth D. ESPDA: Energy efficient and secure pattern-based data aggregation for wireless sensor networks. IEEE Computer Communications 29, 2006. 446-455.
    [6] Du W, Deng J, Han YS, Varshney PK. A witness-based approach for data fusion assurance in wireless sensor networks. IEEE GLOBECOM, 2003, 1435-1439.
    [7] Przydatek B, Song D, Perrig A. Secure information aggregation in sensor networks. In: Proc. of the SenSys 2003. ACM, 2003. 255-265.
    [8] Alzaid H, Foo E. RSDA: Reputation-Based secure data aggregation in wireless sensor networks. In: Proc. of the 1st Int'l Workshop on Sensor Networks and Ambient Intelligence. Dunedin Academic Press, 2008. 36-42.
    [9] Ayughi F, Faez K, Eskandari Z. A non location aware version of modified LEACH algorithm based on residual energy and number of neighbors. In: Proc. of the Conf. on Advanced Communication Technology. Phoenix Park, 2010. 1076-1080.
    [10] Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. IEEE Communication Magazine, 2002,27(40): 102-114.
    Cited by
Get Citation

李平,阳武,谢晋阳,朱红松,张永光,李晓锋.基于加权拟合分析的WSN安全数据融合机制研究.软件学报,2013,24(S1):108-116

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 02,2013
  • Revised:August 22,2013
  • Online: October 18,2013
You are the first2038300Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063