Title: Secure and energy-efficient data aggregation for wireless sensor networks

Authors: Sofiene Ben Othman; Abdelbasset Trad; Hani Alzaid; Habib Youssef

Addresses: UR PRINCE, ISITcom, Hammam Sousse, University of Sousse, Rue: G.P.1 Hammam Sousse, 4011, Tunisia ' UR PRINCE, ISITcom, Hammam Sousse, University of Sousse, Rue: G.P.1 Hammam Sousse, 4011, Tunisia ' Computer Research Institute, King Abdulaziz City for Science and Technology, P.O. Box 6086, Riyadh 11442, Kingdom of Saudi Arabia ' UR PRINCE, ISITcom, Hammam Sousse, University of Sousse, Rue: G.P.1 Hammam Sousse, 4011, Tunisia

Abstract: Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. To maximise WSN lifetime, it is essential to minimise the number of bits sent and received by each device. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong the network lifetime. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. In this paper two secure and energy-efficient data aggregation schemes have been proposed; these schemes can detect the malicious nodes. The goal of the algorithms used in these schemes is to ensure that the base station (BS) does not accept any forged aggregation results. The proposed two protocols present different trade-offs between computations, communication, and security and can fit a wide variety of application areas.

Keywords: wireless sensor networks; WSNs; data aggregation; MAC; medium access control; signature; energy consumption; network security; energy efficiency; wireless networks; network lifetime; malicious nodes.

DOI: 10.1504/IJMNDI.2013.057146

International Journal of Mobile Network Design and Innovation, 2013 Vol.5 No.1, pp.28 - 42

Published online: 26 Jul 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article