Subscribe
Issue No.02 - February (2008 vol.57)
pp: 261-273
ABSTRACT
Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the wireless sensor network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information assurance of the data fusion process is very important. A witness-based approach has been proposed to verify the fusion data. In this approach, the base station receives the fusion data and votes'' on the data from a randomly chosen sensor node. The vote comes from other sensor nodes, called witnesses,'' to confirm the correctness of the fusion data. Since the base station receives the vote through the chosen node, this node could forge the vote if it is compromised.. This work improves the witness-based approach using a direct voting mechanism, such that the proposed scheme performs better in terms of assurance, overhead and delay. The witness node transmits the vote directly to the base station. Forgery does not pose a problem in this scheme. Moreover, fewer bits are necessary to represent the vote, significantly reducing the power consumption. Performance analysis and simulation results indicate that the proposed approach has a 40-times lower overhead than the witness-based approach.
INDEX TERMS
Wireless sensor networks, Sensor fusion, Network-level security and protection
CITATION
Hung-Ta Pai, Yunghsiang Han, "Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks", IEEE Transactions on Computers, vol.57, no. 2, pp. 261-273, February 2008, doi:10.1109/TC.2007.70805
REFERENCES
 [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 38, no. 8, pp. 102-114, Aug. 2002. [2] S.A. Aldosari and J.M.F. Moura, “Detection in Decentralized Sensor Networks,” Proc. Int'l Conf. Acoustics, Speech, and Signal Processing, pp. 277-280, May 2004. [3] R. Anderson and M. Kuhn, “Tamper Resistance—A Cautionary Note,” Proc. Second Usenix Workshop Electronic Commerce, pp. 1-11, Nov. 1996. [4] J.-F. Chamberland and V.V. Veeravalli, “Asymptotic Results for Decentralized Detection in Power Constrained Wireless Sensor Networks,” IEEE J. Selected Areas Comm., vol. 2, no. 6, pp. 1007-1015, Aug. 2004. [5] D. Culler, D. Estrin, and M. Srivastava, “Overview of Sensor Networks,” Computer, vol. 37, no. 8, pp. 41-49, Aug. 2004. [6] L. Dan, K.D. Wong, H.H. Yu, and A.M. Sayeed, “Detection, Classification, and Tracking of Targets,” IEEE Trans. Signal Processing, vol. 19, no. 3, pp. 17-29, Mar. 2002. [7] A. D'Costa, V. Ramachandran, and A.M. Sayeed, “Distributed Classification of Gaussian Space-Time Sources in Wireless Sensor Networks,” IEEE J. Selected Areas Comm., vol. 22, no. 6, pp. 1026-1036, Aug. 2004. [8] J. Deng, R. Han, and S. Mishra, “A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks,” Proc. Int'l Workshop Information Processing in Sensor Networks, pp. 349-364, 2003. [9] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks,” Proc. IEEE Global Telecomm. Conf., vol. 3, pp. 1435-1439, Dec. 2003. [10] Y. Lin, B. Chen, and P.K. Varshney, “Decision Fusion Rules in Multi-Hop Wireless Sensor Networks,” IEEE Trans. Aerospace and Electronic Systems, vol. 41, no. 2, pp. 475-488, Apr. 2005. [11] J.N. Al-Karaki and A.E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Comm. Magazine, vol. 11, no. 6, pp. 6-28, Dec. 2004. [12] G. Mergen, Q. Zhao, and L. Tong, “Sensor Networks with Mobile Access: Energy and Capacity Considerations,” IEEE Trans. Comm., to appear. [13] D. Niculescu, “Positioning in Ad Hoc Sensor Networks,” IEEE Network, vol. 18, no. 4, pp. 24-29, July-Aug. 2004. [14] D. Niculescu, “Communication Paradigms for Sensor Networks,” IEEE Comm. Magazine, vol. 43, no. 3, pp. 116-122, Mar. 2005. [15] S. Olariu, A. Wadaa, L. Wilson, and M. Eltoweissy, “Wireless Sensor Networks: Leveraging the Virtual Infrastructure,” IEEE Network, vol. 18, no. 4, pp. 51-56, Apr. 2004. [16] S. Olariu and Q. Xu, “Information Assurance in Wireless Sensor Networks,” Proc. IEEE Int'l Parallel and Distributed Processing Symp., p. 236a, Apr. 2005. [17] H.-T. Pai and Y.S. Han, “Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks,” http://arxiv.org/abs0705.3683, May 2007. [18] A. Perrig, J.A. Stankovic, and D. Wagner, “Security in Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004. [19] B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proc. Conf. Embedded Networked Sensor Systems, pp. 255-265, Nov. 2003. [20] R.C. Shah, S. Roy, S. Jain, and W. Brunette, “Data Mules: Modeling a Three-Tier Architecture for Sparse Sensor Networks,” Proc. IEEE Workshop Sensor Network Protocols and Applications, pp. 30-41, May 2003. [21] C.-C. Shen, C. Srisathapornphat, and C. Jaikaeo, “Sensor Information Networking Architecture and Applications,” IEEE Personal Comm. Magazine, vol. 8, no. 4, pp. 52-59, Aug. 2001. [22] E. Shih, S.-H. Cho, N. Iches, and R. Min, “Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Networks,” Proc. MobiCom '01, pp. 272-286, 2001. [23] P. Sholander, A. Harris, and J. Brown, “Intersensor Information Assurance for DOD Tactical Networks,” Proc. Military Comm. Conf., vol. 2, pp. 1456-1461, Oct. 2002. [24] F. Sivrikaya and B. Yener, “Time Synchronization in Sensor Networks: A Survey,” IEEE Network, vol. 18, no. 4, pp. 45-50, July-Aug. 2004. [25] K. Sohrabi, W. Merrill, J. Elson, L. Girod, F. Newberg, and W. Kaiser, “Methods for Scalable Self-Assembly of Ad Hoc Wireless Sensor Networks,” IEEE Trans. Mobile Computing, vol. 3, no. 4, pp.317-331, Oct.-Dec. 2004. [26] L. Tong, Q. Zhao, and S. Adireddy, “Sensor Networks with Mobile Agents,” Proc. IEEE Military Comm. Conf., pp. 688-693, Oct. 2003. [27] J.N. Tsitsiklis, “Decentralized Detection by a Large Number of Sensors,” Math. Control, Signals, and Systems, vol. 1, no. 2, pp. 167-182, 1988. [28] D. Wagner, “Resilient Aggregation in Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 78-87, Oct. 2004. [29] T.-Y. Wang, Y.S. Han, B. Chen, and P.K. Varshney, “A Combined Decision Fusion and Channel Coding Scheme for Distributed Fault-Tolerant Classification in Wireless Sensor Networks,” IEEE Trans. Wireless Comm., vol. 5, no. 7, pp. 1695-1705, 2006. [30] Z. Yang and L. Tong, “Cooperative Sensor Networks with Misinformed Nodes,” IEEE Trans. Information Theory, vol. 51, no. 12, pp. 4118-4133, Dec. 2005. [31] W. Zhao and M.H. Ammar, “Message Ferrying: Proactive Routing in Highly-Partitioned Wireless Ad Hoc Networks,” Proc. IEEE Workshop Future Trends in Distributed Computing Systems, pp. 308-314, May 2003.