|
| | | |
Secure Data Aggregation in Wireless Sensor Network: a survey
Alzaid, H., Foo, E. and Gonzalez Nieto, J.M.
Recent advances in wireless sensor networks
(WSNs) have led to many new promising applications
including habitat monitoring and target tracking.
However, data communication between nodes
consumes a large portion of the total energy consumption
of the WSNs. Consequently, data aggregation
techniques can greatly help to reduce the energy
consumption by eliminating redundant data traveling
back to the base station. The security issues
such as data integrity, confidentiality, and freshness
in data aggregation become crucial when the WSN
is deployed in a remote or hostile environment where
sensors are prone to node failures and compromises.
There is currently research potential in securing data
aggregation in the WSN. With this in mind, the security
issues in data aggregation for the WSN will be
discussed in this paper. Then, the adversarial model
that can be used in any aggregation scheme will be
explained. After that, the 'state-of-the-art' proposed
secure data aggregation schemes will be surveyed and
then classified into two categories based on the number
of aggregator nodes and the existence of the verification
phase. Finally, a conceptual framework will be
proposed to provide new designs with the minimum
security requirements against certain type of adversary.
This framework gives a better understanding of
those schemes and facilitates the evaluation process. |
Cite as: Alzaid, H., Foo, E. and Gonzalez Nieto, J.M. (2008). Secure Data Aggregation in Wireless Sensor Network: a survey. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds. ACS. 93-105. |
(from crpit.com)
(local if available)
|
|