Secure data aggregation in wireless sensor network: a survey

  • Authors:
  • Hani Alzaid;Ernest Foo;Juan Gonzalez Nieto

  • Affiliations:
  • Qeensland University of Technology, Brisbane, Queensland;Qeensland University of Technology, Brisbane, Queensland;Qeensland University of Technology, Brisbane, Queensland

  • Venue:
  • AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in the WSN. With this in mind, the security issues in data aggregation for the WSN will be discussed in this paper. Then, the adversarial model that can be used in any aggregation scheme will be explained. After that, the "state-of-the-art" proposed secure data aggregation schemes will be surveyed and then classified into two categories based on the number of aggregator nodes and the existence of the verification phase. Finally, a conceptual framework will be proposed to provide new designs with the minimum security requirements against certain type of adversary. This framework gives a better understanding of those schemes and facilitates the evaluation process.