Secure and Efficient Data Collection in Sensor Networks | SpringerLink
Skip to main content

Secure and Efficient Data Collection in Sensor Networks

  • Conference paper
Wireless Systems and Mobility in Next Generation Internet (EuroNGI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5122))

Included in the following conference series:

  • 322 Accesses

Abstract

Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed data and at the same time minimize the battery energy consumption. This paper proposes an efficient way to perform data collection by grouping the sensors in aggregation zones, allowing the aggregators to process the sensed data inside the aggregation zone in order to minimize the amount of transmissions to the sink. Moreover, the paper provides a security mechanism based on hash chains to secure data transmissions in networks with low capability sensors and without the requirements of an instantaneous source authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. Internet Request for Comments RFC 3561 (November 2003)

    Google Scholar 

  3. Clausen, T., Jacquet, P. (eds.) Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized link state routing protocol (olsr). RFC 3626, Network Working Group (October 2003)

    Google Scholar 

  4. Hauser, R., Przygienda, A., Tsudik, G.: Reducing the cost of security in link state routing. In: Symposium on Network and Distributed Systems Security (NDSS 1997), San Diego, California, February 1997, pp. 93–99. Internet Society (1997)

    Google Scholar 

  5. Cheung, S.: An efficient message authentication scheme for link state routing. In: 13th Annual Computer Security Applications Conference, pp. 90–98 (1997)

    Google Scholar 

  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189–199 (2001)

    Google Scholar 

  7. Zhang, K.: Efficient protocols for signing routing messages. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 1998) (July 2001)

    Google Scholar 

  8. Asokan, N.: Presentation at an informal workshop on mobile and ad hoc networking security, EPFL, Lausanne (December 2001)

    Google Scholar 

  9. Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September 2002, pp. 1–10 (2002)

    Google Scholar 

  10. Hu, Y.C., Johnson, D., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)

    Google Scholar 

  11. Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual International Conference on Mobile Computing and Networking, pp. 85–97 (1998)

    Google Scholar 

  12. Krishnamachari, B., Estrin, D., Wicker, S.B.: The impact of data aggregation in wireless sensor networks. In: ICDCSW 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems, Washington, DC, USA, pp. 575–578. IEEE Computer Society, Los Alamitos (2002)

    Google Scholar 

  13. Kalpakis, K., Dasgupta, K., Namjoshi, P.: Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks. Comput. Networks 42(6), 697–716 (2003)

    Article  MATH  Google Scholar 

  14. Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: ACM SenSys 2003 (November 2003)

    Google Scholar 

  15. Chen, G., Szymanski, B.K.: Cost: A component-oriented discrete event simulator. In: Proceedings of the 2002 Winter Simulation Conference, pp. 776–782 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cano, C., Guerrero, M., Bellalta, B. (2008). Secure and Efficient Data Collection in Sensor Networks. In: Cerdà-Alabern, L. (eds) Wireless Systems and Mobility in Next Generation Internet. EuroNGI 2008. Lecture Notes in Computer Science, vol 5122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89183-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89183-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89182-6

  • Online ISBN: 978-3-540-89183-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics