IDEAS home Printed from https://ideas.repec.org/a/wly/intnem/v28y2018i1ne2000.html
   My bibliography  Save this article

Secure and efficient verification for data aggregation in wireless sensor networks

Author

Listed:
  • Omar Rafik Merad Boudia
  • Sidi Mohammed Senouci
  • Mohammed Feham

Abstract

The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the major concerns in WSNs. In order to verify the data, there is either the end‐to‐end approach or the hop‐by‐hop approach. In the former, the detection of these attacks can only be performed at sink node, i.e., after reception of aggregate, a detection that is inefficient and leads to a significant loss of legitimate data. In this paper, we propose a scheme that provides the end‐to‐end privacy and allows early detection of the attack through a hop‐by‐hop verification, thus reducing the need to rely entirely on sink node for verification. Based on an enhanced version of TinyECC, the solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of the scheme for WSNs.

Suggested Citation

  • Omar Rafik Merad Boudia & Sidi Mohammed Senouci & Mohammed Feham, 2018. "Secure and efficient verification for data aggregation in wireless sensor networks," International Journal of Network Management, John Wiley & Sons, vol. 28(1), January.
  • Handle: RePEc:wly:intnem:v:28:y:2018:i:1:n:e2000
    DOI: 10.1002/nem.2000
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/nem.2000
    Download Restriction: no

    File URL: https://libkey.io/10.1002/nem.2000?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:intnem:v:28:y:2018:i:1:n:e2000. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1099-1190 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.