Secure and Energy-Efficient Spatial Data Aggregation Algorithm in Wireless Sensor Networks
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [20]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    This paper proposes a secure and energy-efficient spatial data aggregation algorithm for sensor networks (SESDA for short). SESDA is an itinerary-based algorithm to achieve data aggregation. Owing to the well-designed itinerary for aggregate request propagation and data aggregation, SESDA is not susceptible to network topology and thus suitable for sensor networks with transient network topology, hence improves energy efficiency. In addition, to counter dramatic energy consumption caused by heavy encryption/ decryption operations, SESDA uses secure channel to obtain data privacy. SESDA needs no encryption/decryption operations during data aggregation, which significantly reduces the energy consumption, prolongs the lifetime of sensor networks, and achieves high accuracy of aggregation results due to small delivery delay. Theoretical analysis and experimental results show that SESDA has low traffic and energy consumption, high safety and accuracy.

    Reference
    [1] Culler D, Estrin D, Srivastava M. Overview of sensor networks. IEEE Computer, 2004,37(8):41-49. [doi: 10.1109/MC.2004.93]
    [2] Xu N, Rangwala S, Chintalapudi KK, Ganesan D, Broad A, Govindan R, Estrin D. A wireless sensor network for structural monitoring. In: Stankovic JA, Arora A, Govindan R, eds. Proc. of the 2nd ACM Conf. on Embedded Networked Sensor Systems. Baltimore: ACM Press, 2004. 13-24. [doi: 10.1145/1031495.1031498]
    [3] Zhang XW, Dai HP, Xu LJ, Chen GH. Mobility-Assisted data gathering strategies in WSNs. Ruan Jian Xue Bao/Journal of Software, 2013,24(2):198-214 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4349.htm [doi: 10.3724/SP.J. 1001.2013.04349]
    [4] He W, Nguyen H, Liu X, Nahrstedt K, Abdelzaher T. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks. In: Proc. of the IEEE Military Communication Conf. San Diego: IEEE Press, 2008. 1-7. [doi: 10.1109/MILCOM. 2008.4753645]
    [5] Girao J, Westhoff D, Schneider M. CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proc. of the IEEE Int'l Conf. on Communications. Seoul: IEEE Press, 2005. 3044-3049. [doi: 10.1109/ICC.2005.1494953]
    [6] Yu Y, Krishnamachari B, Prasanna VK. Energy-Latency tradeoffs for data gathering in wireless sensor networks. In: Proc. of the 23rd IEEE Int'l Conf. on Computer Communications. Hong Kong: IEEE Press, 2004. 244-255. [doi: 10.1109/INFCOM.2004.1354 498]
    [7] Madden S, Franklin MJ, Hellerstein JM, Hong W. TAG: A tiny aggregation service for ad-hoc sensor networks. In: Proc. of the ACM OSDI. Boston: ACM Press, 2002. 131-146. [doi: 10.1145/844128.844142]
    [8] Xu Y, Lee WC, Xu J, Mitchell G. Processing window queries in wireless sensor networks. In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Proc. of the 22nd IEEE Conf. on Data Engineering. Atlanta: IEEE Press, 2006. 70-80. [doi: 10.1109/ICDE.2006.119]
    [9] Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. In: Proc. of the 2nd Annual Int'l Conf. on Mobile and Ubiquitous Systems. San Diego: IEEE Press, 2005. 109-117. [doi: 10.1109/MOBIQUITOUS. 2005.25]
    [10] He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. PDA: Privacy-Preserving data aggregation in wireless sensor networks. In: Proc. of the 26th IEEE Int'l Conf. on Computer Communications. Alaska: IEEE Press, 2007. 2045-2053. [doi: 10.1109/INFCOM. 2007.237]
    [11] Yang Y, Wang X, Zhu S, Cao G. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. ACM Trans. on Information and System Security, 2008,11(4):18. [doi: 10.1145/1380564.1380568]
    [12] Li HJ, Lin K, Li KQ. Energy-Efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 2011,34(4):591-597. [doi: 10.1016/j.comcom.2010.02.026]
    [13] Ozdemir S, Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 2011,55(8):1735-1746. [doi: 10.1016/j.comnet.2011.01.006]
    [14] Karp B, Kung HT. GPSR: Greedy perimeter stateless routing for wireless networks. In: Pickholtz RL, Das SK, Cáceres R, et al., eds. Proc. of the 6th Annual ACM Int'l Conf. on Mobile Computing and Networking. Boston: ACM Press, 2000. 243-254. [doi: 10.1145/345910.345953]
    [15] Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: Vijayalakshmi A, ed. Proc. of the 9th ACM Conf. on Computer and Communications Security. Washington: ACM Press, 2002. 41-47. [doi: 10.1145/586110.586117]
    [16] Fu TY, Peng WC, Lee WC. Parallelizing itinerary-based KNN query processing in wireless sensor networks. IEEE Trans. on Knowledge and Data Engineering, 2010,22(5):711-729. [doi: 10.1109/TKDE.2009.146]
    [17] Zuniga M, Krishnamachari B. Analyzing the transitional region in low power wireless links. In: Proc. of the 1st Annual IEEE Communications Society Conf. on Sensor and Ad Hoc Communications and Networks. Washington: IEEE Press, 2004. 517-526.[doi: 10.1109/SAHCN.2004.1381954]
    [18] Coman A, Nascimento MA, Sander J. A framework for spatio-temporal query processing over wireless sensor networks. In: Labrinidis A, Madden S, eds. Proc. of the 1st Workshop on Data Management for Sensor Networks, in Conjunction with VLDB. Toronto: ACM Press, 2004. 104-110. [doi: 10.1145/1052199.1052217]
    [19] Samuel M. Intel lab data. 2004. http://db.csail.mit.edu/labdata/labdata.html
    [20] Groat MM, He W, Forrest S. KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: Proc. of the 30th IEEE Int'l Conf. on Computer Communications. Shanghai, 2011. 2024-2032. [doi: 10.1109/INFCOM.2011.5935010]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

王涛春,秦小麟,刘亮,丁有伟.无线传感器网络中安全高效的空间数据聚集算法.软件学报,2014,25(8):1671-1684

Copy
Share
Article Metrics
  • Abstract:5958
  • PDF: 8042
  • HTML: 2464
  • Cited by: 0
History
  • Received:February 09,2014
  • Revised:April 29,2014
  • Online: August 01,2014
You are the first2036643Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063