Limits...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.


ESPDA protocol.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f005: ESPDA protocol.

Mentions: Energy-efficient and Secure Pattern based Data Aggregation (ESPDA) [19] works on clustered-based WSNs and is suitable for LEACH-based secure routing protocols. Figure 5 shows a summary of ESPDA protocol. The main idea of ESPDA is that instead of directly sending the actual sensed data to the CH, the sensor nodes send their pattern codes first. The pattern code is data representative of the sensed data and is generated based on the secret pattern seed which is periodically distributed by the CH. The CH then compares those pattern codes, selects only the unique ones and requests the actual data from the nodes having the corresponding unique codes. In reply, each selected node then sends the encrypted actual data to the CH while the rest may be instructed to drop the data. The CH does not need to decrypt the received encrypted data because the data aggregation process is done prior to the actual data transmission. This reduces the overhead of the CH and thus contributes to the energy efficiency. Then CH can forward the message to the BS.


A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

ESPDA protocol.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f005: ESPDA protocol.
Mentions: Energy-efficient and Secure Pattern based Data Aggregation (ESPDA) [19] works on clustered-based WSNs and is suitable for LEACH-based secure routing protocols. Figure 5 shows a summary of ESPDA protocol. The main idea of ESPDA is that instead of directly sending the actual sensed data to the CH, the sensor nodes send their pattern codes first. The pattern code is data representative of the sensed data and is generated based on the secret pattern seed which is periodically distributed by the CH. The CH then compares those pattern codes, selects only the unique ones and requests the actual data from the nodes having the corresponding unique codes. In reply, each selected node then sends the encrypted actual data to the CH while the rest may be instructed to drop the data. The CH does not need to decrypt the received encrypted data because the data aggregation process is done prior to the actual data transmission. This reduces the overhead of the CH and thus contributes to the energy efficiency. Then CH can forward the message to the BS.

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.