Abstract
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed data and at the same time minimize the battery energy consumption. This paper proposes an efficient way to perform data collection by grouping the sensors in aggregation zones, allowing the aggregators to process the sensed data inside the aggregation zone in order to minimize the amount of transmissions to the sink. Moreover, the paper provides a security mechanism based on hash chains to secure data transmissions in networks with low capability sensors and without the requirements of an instantaneous source authentication.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. Internet Request for Comments RFC 3561 (November 2003)
Clausen, T., Jacquet, P. (eds.) Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized link state routing protocol (olsr). RFC 3626, Network Working Group (October 2003)
Hauser, R., Przygienda, A., Tsudik, G.: Reducing the cost of security in link state routing. In: Symposium on Network and Distributed Systems Security (NDSS 1997), San Diego, California, February 1997, pp. 93–99. Internet Society (1997)
Cheung, S.: An efficient message authentication scheme for link state routing. In: 13th Annual Computer Security Applications Conference, pp. 90–98 (1997)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189–199 (2001)
Zhang, K.: Efficient protocols for signing routing messages. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 1998) (July 2001)
Asokan, N.: Presentation at an informal workshop on mobile and ad hoc networking security, EPFL, Lausanne (December 2001)
Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September 2002, pp. 1–10 (2002)
Hu, Y.C., Johnson, D., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)
Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual International Conference on Mobile Computing and Networking, pp. 85–97 (1998)
Krishnamachari, B., Estrin, D., Wicker, S.B.: The impact of data aggregation in wireless sensor networks. In: ICDCSW 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems, Washington, DC, USA, pp. 575–578. IEEE Computer Society, Los Alamitos (2002)
Kalpakis, K., Dasgupta, K., Namjoshi, P.: Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks. Comput. Networks 42(6), 697–716 (2003)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: ACM SenSys 2003 (November 2003)
Chen, G., Szymanski, B.K.: Cost: A component-oriented discrete event simulator. In: Proceedings of the 2002 Winter Simulation Conference, pp. 776–782 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cano, C., Guerrero, M., Bellalta, B. (2008). Secure and Efficient Data Collection in Sensor Networks. In: Cerdà-Alabern, L. (eds) Wireless Systems and Mobility in Next Generation Internet. EuroNGI 2008. Lecture Notes in Computer Science, vol 5122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89183-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-89183-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89182-6
Online ISBN: 978-3-540-89183-3
eBook Packages: Computer ScienceComputer Science (R0)