The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - Oct. (2012 vol.24)
pp: 1760-1773
Stavros Papadopoulos , Hong Kong University of Science and Technology, Hong Kong
Aggelos Kiayias , National and Kapodistrian University of Athens, Athens
Dimitris Papadias , Hong Kong University of Science and Technology, Hong Kong
ABSTRACT
In-network aggregation reduces the energy cost of processing aggregate queries (such as SUM, MAX, etc.) in wireless sensor networks. Recently, research has focused on secure in-network aggregation, motivated by the following two scenarios: 1) the sensors are deployed in open and unsafe environments, and 2) the aggregation process is outsourced to an untrustworthy service. Despite the bulk of work on the topic, there is currently no solution providing both integrity and confidentiality in the above scenarios. Moreover, existing solutions either return approximate results, or have limited applicability to certain types of aggregate queries. Our paper is the first work that provides both integrity and confidentiality in the aforementioned scenarios, while covering a wide range of aggregates and returning exact results. We initially present SIES, a scheme that solves exact SUM queries through a combination of homomorphic encryption and secret sharing. Subsequently, we show how to adapt SIES in order to support many other exact aggregate queries (such as MAX, MEDIAN, etc.). Finally, we augment our schemes with a functionality that identifies malicious sensors, preventing denial-of-service (DoS) attacks and attributing robustness to the system. Our techniques are lightweight and induce very small bandwidth consumption. Therefore, they constitute ideal solutions for resource-constrained sensors.
INDEX TERMS
Sensors, Aggregates, Protocols, Encryption, Wireless sensor networks, confidentiality., Sensor networks, aggregation, in-network, security, integrity
CITATION
Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias, "Exact In-Network Aggregation with Integrity and Confidentiality", IEEE Transactions on Knowledge & Data Engineering, vol.24, no. 10, pp. 1760-1773, Oct. 2012, doi:10.1109/TKDE.2012.64
REFERENCES
[1] S. Madden, M.J. Franklin, J. Hellerstein, and W. Hong, "TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI), 2002.
[2] Y. Yao and J. Gehrke, "The COUGAR Approach to In-Network Query Processing in Sensor Networks," ACM SIGMOD Record, vol. 31, no. 3, pp. 9-18, 2002.
[3] L. Hu and D. Evans, "Secure Aggregation for Wireless Networks," Proc. Symp. Applications and the Internet Workshops (SAINT-W), 2003.
[4] P. Jadia and A. Mathuria, "Efficient Secure Aggregation in Sensor Networks," Proc. 11th Int'l Conf. High Performance Computing (HiPC), 2004.
[5] C. Castelluccia, E. Mykletyn, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), 2005.
[6] B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," Proc. First Int'l Conf. Embedded Networked Sensor Systems (SenSys), 2003.
[7] M. Garofalakis, J.M. Hellerstein, and P. Maniatis, "Proof Sketches: Verifiable In-Network Aggregation," Proc. Int'l Conf. Data Eng. (ICDE), 2007.
[8] S. Nath, H. Yu, and H. Chan, "Secure Outsourced Aggregation via One-Way Chains," Proc. ACM Int'l Conf. Management of Data (SIGMOD), 2009.
[9] SenseWeb, Microsoft Research, http://research. microsoft.com/en-us/projects senseweb/, 2011.
[10] E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, "In-Network Aggregation Techniques for Wireless Sensor Networks: A Survey," IEEE Wireless Comm., vol. 14, no. 2, pp. 70-87, Apr. 2007.
[11] J. Considine, F. Li, G. Kollios, and J. Byers, "Approximate Aggregation Techniques for Sensor Databases," Proc. Int'l Conf. Data Eng. (ICDE), 2004.
[12] N. Shrivastava, C. Buragohain, D. Agrawal, and S. Suri, "Medians and Beyond: New Aggregation Techniques for Sensor Networks," Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys), 2004.
[13] M.B. Greenwald and S. Khanna, "Power-Conserving Computation of Order-Statistics over Sensor Networks," Proc. 23rd ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS), 2004.
[14] R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
[15] M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Proc. 16th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), 1996.
[16] A.J. Menezes, P.C.V. Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, Inc., 1996.
[17] J. Kim, A. Biryukov, B. Preneel, and S. Hong, "On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1," Proc. Fifth Int'l Conf. Security and Cryptography for Networks (SCN), 2006.
[18] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, "SPINS: Security Protocols for Sensor Networks," Proc. Mobile Computing and Networking, 2001.
[19] H. Chan, H.-C. Hsiao, A. Perrig, and D. Song, "Secure Distributed Data Aggregation," J. Foundations and Trends in Databases, vol. 3, no. 3, pp. 149-201, 2011.
[20] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, "A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks," Proc. IEEE Global Telecomm. Conf. (GLOBECOM), 2003.
[21] H. Chan, A. Perrig, and D. Song, "Secure Hierarchical In-Network Aggregation in Sensor Networks," Proc. 13th ACM Conf. Computer and Comm. Security (CCS), 2006.
[22] K.B. Frikken and J.A. DoughertyIV, "An Efficient Integrity-Preserving Scheme for Hierarchical Sensor Aggregation," Proc. First ACM Conf. Wireless Network Security (WiSec), 2008.
[23] R. Merkle, "A Certified Digital Signature," Proc. Advances in Cryptology (CRYPTO), 1989.
[24] K.B. Frikken, K. Kauffman, and A. Steele, "General Secure Sensor Aggregation in the Presence of Malicious Nodes," Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE), 2011.
[25] S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS), 2003.
[26] J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC '05), 2005.
[27] W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks," Proc. INFOCOM Conf., 2007.
[28] M. Conti, L. Zhang, S. Roy, R. Di Pietro, S. Jajodia, and L.V. Mancini, "Privacy-Preserving Robust Data Aggregation in Wireless Sensor Networks," Security and Comm. Networks, vol. 2, no. 2, pp. 195-213, 2009.
[29] T. Dimitriou and D. Foteinakis, "Secure and Efficient in-Network Processing for Sensor Networks," Proc. Int'l Conf. Broadband Networks (BroadNets), 2004.
[30] C. Castelluccia and C. Soriente, "ABBA: A Balls and Bins Approach to Secure Aggregation in WSNs," Proc. Sixth Int'l Symp. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOpt), 2008.
[31] R. Di Pietro, P. Michiardi, and R. Molva, "Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring," Security and Comm. Networks, vol. 2, no. 2, pp. 181-194, 2009.
[32] K.B. Frikken and Y. Zhang, "Confidentiality and Integrity for SUM Aggregation in Sensor Networks," Proc. Int'l Conf. Security and Cryptography (SECRYPT), 2010.
[33] A. Mahimkar and T.S. Rappaport, "SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks," Proc. IEEE Global Telecomm. Conf. (GLOBECOM), 2004.
[34] S. Roy, S. Setia, and S. Jajodia, "Attack-Resilient Hierarchical Data Aggregation in Sensor Networks," Proc. Fourth ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), 2006.
[35] Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," Proc. MobiHoc Conf., 2006.
[36] S. Roy, M. Conti, S. Setia, and S. Jajodia, "Securely Computing an Approximate Median in Wireless Sensor Networks," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm), 2008.
[37] H. Yu, "Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks via Set Sampling," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN), 2009.
[38] P. Haghani, P. Papadimitratos, M. Poturalski, K. Aberer, and J.-P. Hubaux, "Efficient and Robust Secure Aggregation for Sensor Networks," Proc. IEEE Third Workshop Secure Network Protocols (NPSEC), 2007.
[39] G. Taban and V.D. Gligor, "Efficient Handling of Adversary Attacks in Aggregation Applications," Proc. 13th European Symp. Research in Computer Security: Computer Security (ESORICS), 2008.
[40] J. Katz and Y. Lindell, Introduction to Modern Cryptography. Chapman Hall/CRC, 2008.
32 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool