SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS

Similar documents
An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

On Demand secure routing protocol resilient to Byzantine failures

Spoofing Detection in Wireless Networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Sleep/Wake Aware Local Monitoring (SLAM)

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

A Fault-Event Detection Model Using Trust Matrix in WSN

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNTERMEASURE

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

Selective Forwarding Attacks Detection in WSNs

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Secure Multi-Hop Infrastructure Access

Introduction to Mobile Ad hoc Networks (MANETs)

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Wireless Sensor Networks: Security Issues, Challenges and Solutions

CSMA based Medium Access Control for Wireless Sensor Network

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

REPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Sybil defenses via social networks

GP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

State-Based Synchronization Protocol in Sensor Networks

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

WIRELESS sensor networks have received a lot of attention

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Catching BlackHole Attacks in Wireless Sensor Networks

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Spoofing Attacks in wireless Sensor Networks

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS

Security in Mobile Ad-hoc Networks. Wormhole Attacks

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT

Trust4All: a Trustworthy Middleware Platform for Component Software

An Effective Outlier Detection-Based Data Aggregation for Wireless Sensor Networks

Routing protocols in WSN

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Packet Estimation with CBDS Approach to secure MANET

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Detection of Sybil Attack in Wireless Sensor Network

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs

Sybil Attack Detection and Prevention Using AODV in VANET

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

International Journal of Advance Research in Computer Science and Management Studies

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Secure Data Collection for Wireless Sensor Networks

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Secure Embedded Wireless Networks

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

CHAPTER 5 OUTLIER CLEANING AND SENSOR DATA AGGREGATION USING MODIFIED Z-SCORE TECHNIQUE

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

Detection of Wormhole Attacks in Wireless Sensor Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Entropy-Based Recommendation Trust Model for Machine to Machine Communications

AES and DES Using Secure and Dynamic Data Storage in Cloud

Security of Mobile Ad Hoc and Wireless Sensor Networks

A Novel Data Aggregation Scheme for Energy Efficient Wireless Sensor Networks

Challenges in Mobile Ad Hoc Network

Mobile Agent Driven Time Synchronized Energy Efficient WSN

sensors ISSN

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network

Computer Communications

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN

Introduction and Statement of the Problem

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks

Transcription:

SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS G.Gomathi 1, C.Yalini 2, T.K.Revathi. 3, 1 M.E Student, Kongunadu College of Engineering, Trichy 2, 3 Assistant Professors/CSE Dept., Kongunadu College of Engineering, Trichy ABSTRACT Network security involves the authorization of access to data in a network, which is controlled the network administrator. Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. Collision attack means the group of nodes to access the illegal data. The data collected from individual nodes is aggregated at a base station or host computer. Due to limited computational power and power resources, aggregation of information from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is well-known to be highly vulnerable to node compromising attacks. Iterative filtering algorithms hold great promise for such a function. Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources frequently in a form of corresponding weight factors assigned to data provided by each source. Data aggregation process can enhance the robustness and accuracy of information which is obtained by entire network. In a wormhole attack, the attacker receives packets at one point in the network, forwards them throughout a wired or wireless connection with less latency than the system links, and relays them to another point in the network. A distribute Warmhole detection algorithm for wireless sensor networks, which detect wormholes based on the distortions they create in a network. Key words: Data aggregation technique, Collusion attack, Wireless sensor networks, Iterative filtering algorithm. 1. INTRODUCTION A wireless sensor network (WSN) consists of a collection of these nodes that have the facility to sense, process data and communicate with each other via a wireless connection. Wireless sensor networks (WSN s), the improvement in sensor technology has made it possible to have very small, low powered sensing devices equipped with programmable compute, multiple parameter sensing and wireless message capability. Also, the low cost makes it possible to have a network of hundreds or thousands of these sensors, thereby enhancing the consistency and accuracy of data and the area coverage. Wireless sensor networks offer information about isolated structures, wide-spread environmental changes, etc. Wireless sensor network (WSN) is a network system comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental situation, such as sound, temperature, and motion. FIGURE 1: An operating system of a WSN Trust and reputation systems have a significant role in supporting operation of a wide range of distributed systems, from wireless sensor networks and e-commerce infrastructure to social networks, by providing an assessment of trustworthiness of participants in such distributed systems. A trustworthiness assessment at any given moment represents an aggregate of the behavior of the participants up to that moment and has to be robust in the presence of various types of faults and malicious behavior. There are a number of incentives for attackers 229

to manipulate the trust and reputation scores of participants in a distributed system, and such manipulation can severely impair the performance of such a system. The main target of malicious attackers are aggregation algorithms of trust and reputation systems. A sensor network is designed to perform a set of highlevel information processing tasks such as detection, track, or categorization. Measures of performance for these tasks are well defined, including discovery of false alarms or misses, classification errors, and track quality. As the computational power of very low power processors dramatically increases, mostly driven by demands of mobile computing, and as the cost of such technology drops, WSNs will be able to afford hardware which can implement more sophisticated data aggregation and trust assessment algorithms; an example is the recent emergence of multi-core and multiprocessor systems in sensor nodes. Iterative Filtering (IF) algorithms are an attractive option for WSNs because they solve both problems - data aggregation and data trustworthiness assessment - using a single iterative procedure. Such trustworthiness estimate of each sensor is based on the distance of the readings of such a sensor from the estimate of the correct values, obtained in the previous round of iteration by some form of aggregation of the readings of all sensors. Such aggregation is usually a weighted average; sensors whose readings significantly differ from such estimate are assigned less trustworthiness and consequently in the aggregation process in the present round of iteration their readings are given a lower weight. 2. RELATED WORKS In this paper [3] He, W., Liu, X., Nguyen, H. V., Nahrstedt, K., and Abdelzaher, T, they present one privacy -preserving data aggregation scheme for additive aggregation functions, which can be extensive to approximate MAX/MIN aggregation function. The first method Cluster-based Private Data Aggregation (CPDA) -leverages clustering protocol and algebraic properties of polynomials. It has the advantage of incur less communication overhead. The second scheme Slice Mix -AggRegaTe(SMART) builds on slicing techniques and the associative property of addition. In[4] Carlos R. Perez-Toro, Rajesh K. Panta, Saurabh Bagchi In this paper RDAS, a strong data aggregation protocol that use a reputation-based advance to recognize and cut off cruel nodes in a sensor network. RDAS is based on a hierarchical cluster form of nodes, where a cluster head clarify data from the cluster nodes to find out the location of an event. It uses the repetition of multiple nodes sense an event to decide what data ought to have been reported by each node. RDAS is able to execute accurate data aggregation in the presence of independently hateful and collude nodes, as well as nodes that try to compromise the integrity of the reputation system by lying about other nodes behavior. In [1] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, Our work is also closely related to the trust and reputation systems in WSNs. Authors proposed a general reputation framework for sensor networks in which each node develops a reputation estimation for other nodes by observing its neighbors which make a trust community for sensor nodes in the network. In [6] Suat Ozdemir,Yang Xiao presents Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network. As wireless sensor networks are frequently deployed in remote and hostile environments to transmit sensitive messages, sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and integrity are very important. Hence, wireless sensor system protocols, e.g., data aggregation protocol, must be planned with security in mind. This paper investigate the relationship between security and data aggregation process in wireless sensor networks. A taxonomy of secure data aggregation procedure is given by surveying the current state-ofthe-art work in this region. In addition, based on the existing study, the open research areas and future research directions in secure data aggregation concept are provided. In [8] X.-Y. Xiao, W.-C. Peng, C.-C. Hung, and W.-C. Lee proposed a trust based framework which employs correlation to detect faulty readings. Moreover, they introduced a ranking framework to associate a level of trustworthiness with each sensor node based on the number of neighboring sensor nodes are supporting the sensor. 3.1 NETWORK MODEL A WSN consists of small-sized sensor devices, which are equipped with limited battery power and are capable of wireless communications. When a WSN is deployed in a sensing field, these sensor nodes will be responsible for sensing abnormal events or for collecting the sensed data of the environment. In the case of a sensor node detecting an abnormal event or being set to periodically report the sensed data, it will send the message hop-byhop to a special node, called a sink node. The sink node will then inform the supervisor through the Internet. 230

FIGURE 2: Network model of a WSN The sensor nodes are divided into disjoint clusters, and every cluster has a cluster head which acts as an aggregator. Data are periodically together and aggregated by the aggregator. values of temperature which are aggregated using the IF algorithm planned in with the reciprocal discriminated function. In scenario 1, all sensors are reliable and the result of the IF algorithm is close to the actual value. In scenario 2, an adversary compromises two sensor nodes, and alters the readings of these values such that the simple average of all sensor readings is skewed towards a lesser value. As these two sensor nodes report a lower value, IF algorithm penalizes them and assigns to them lower weights, because their values are far from the values of other sensors. In other words, the algorithm is robust against false data injection in this scenario because the compromised nodes individually falsify the readings without any knowledge about the aggregation algorithm. The algorithm assigns very low weights to these two sensor nodes and consequently their contributions decrease. FIGURE 4: Attack scenario against IF algorithm FIGURE 3: Cluster head communication In this paper take for granted that the aggregator itself is not compromised and concentrate on algorithms which make aggregation secure when the individual sensor nodes might be compromised and might be sending false data to the aggregator. Assume that every data aggregator has enough computational power to run an IF algorithm for data aggregation. 3.2 COLLUSION ATTACK IN WIRELESS SENSOR NETWORK Most of the IF algorithms occupy simple assumptions about the initial values of weights for sensors. In case of our opponent model, an attacker is able to misinform the aggregation system from side to side cautious range of report data standards. Assume that ten sensors report the In scenario 3, an adversary employs three compromised nodes in order to launch a collusion attack. It listen to the reports of sensors in the network and instructs the two compromised sensor nodes to report values far from the true value of the measured quantity. It then computes the skewed value of the simple average of all sensor readings and commands the third compromised sensor to report such skewed average as its readings. 3.3 DATA AGGREGATION TECHNIQUE In this part, present our robust data aggregation method. 3.3.1 FRAMEWORK OVERVIEW In order to recover the performance of IF algorithms against the aforementioned attack scenario, we provide a robust initial estimation of the trustworthiness of sensor nodes to be used in the first iteration of the IF algorithm. 231

RMS Error International Journal of Emerging Technologies and Engineering (IJETE) FIGURE 5: Framework overview of Data Aggregation Technique Most of the traditional statistical estimation methods for variance involve use of the sample mean. For this reason, proposing a robust variance estimation method in the case of skewed sample mean is an essential part of our methodology. 3.4 ENHANCED ITERATIVE FILTERING ALGORITHM IF algorithm is robust against the simple outlier injection by the compromised nodes. An adversary employs three compromised nodes in order to launch a collusion attack. It listens to the reports of sensors in the network and instructs the two compromised sensor nodes to report values far from the true value of the measured quantity. It then computes the skewed value of the simple average of all sensor readings and commands the third compromised sensor to report such skewed average as its readings. In other words, two compromised nodes distort the simple average of readings, while the third compromised node reports a value very close to such distorted average thus making such reading appear to the IF algorithm as a highly reliable reading. As a result, IF algorithms will meet to the values provide by the third compromised node, because in the first iteration of the algorithm the third compromised node will achieve the highest influence, radically dominate the weights of all other sensors. Initial test vector based on the IF method provide a robust nature of the security system. 4. EXPERIMENTAL RESULTS The objective of our experiments is to evaluate the robustness and efficiency of our approach for estimating the true values of signal based on the sensor readings in the presence of faults and collusion attacks. For each experiment, we evaluate the accuracy based on Root Mean Squared error (RMS error) metric and efficiency based on the number of iterations needed for convergence of IF algorithms. Apply dkvd-reciprocal, dkvd-affine, Zhou, Laureti and robust aggregation approach to synthetically generated information. Although simply apply our robust framework to all existing IF approaches, in this paper investigate the improvement which addition of our initial trustworthiness assessment method produces on the robustness of dkvd-reciprocal and dkvd-affine methods. The main shortcoming of the IF algorithms in the proposed attack scenario is that they quickly converge to the sample mean in the presence of the attack scenario. In order to investigate the shortcoming, we conducted an experiment by increasing the sensor variances as well as the number of colluders. In this experiment, quantified the number of iterations for the IF algorithm with reciprocal discriminant function (dkvd-reciprocal and RobustAggregate- Reciprocal algorithms). 4.5 4 3.5 3 2.5 2 1.5 1 0.5 Accuracy for Collusion Attack Scenarios 0 1 2.5 4 σes=n(0,sσ2) Robust Aggregat e-affine Zhou Lauroti 232

RMS Error International Journal of Emerging Technologies and Engineering (IJETE) The results obtain from this experiment show that the original version of the IF algorithm quickly converges to the skewed values provided by one of the attackers, while starting with an initial reputation provided by our approach, the algorithms require around 29 iterations, and, instead of converging to the skewed value provided by one of the attackers, it provide a reasonable accuracy. 60 50 40 30 20 10 Correlated Noise Robust Aggregate- Affine Zhou Lauroti Robust Aggregate- Reciprocal algorithm needs fewer iterations to reach its stationary point. 5. CONCLUSION Compromised node provide a false data aggregated information to the aggregator node so the total information collected by the node should be wrong. This can be avoided by implementing the iterative filtering algorithm introduced in the aggregator node for providing a security. Trust and reputation have been recently suggested as an effective security mechanism for Wireless Sensor Networks Iterative Filtering (IF) algorithms are an attractive option for WSNs because they solve both problems data aggregation and data trustworthiness assessment using a single iterative procedure In order to improve the performance of IF algorithms against the aforementioned attack scenario, provide a robust initial estimation of the trustworthiness of sensor nodes to be used in the first iteration of the IF algorithm. Proposed an improvement for the IF algorithms by providing an initial approximation of the trustworthiness of sensor nodes which makes the algorithms not only collusion robust, but also more precise and faster converging. REFERENCES [1] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, Reputationbased framework for high integrity sensor networks, ACM Trans. Sen. Netw., vol. 4, no. 3, pp. 15:1 15:37, Jun. 2008. [2] Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAP: a secure hop by hop data aggregation protocol for sensor networks, in MobiHoc, 2006, pp. 356 367. 0 1 2 3 4 5 σ,σs=σ s,ρ(i,j)=exp(- i-j /N) [3] He, W., Liu, X., Nguyen, H. V., Nahrstedt, K., and Abdelzaher, T. 2011. Privacy preserving data aggregation for information collection "ACM Transaction Sensor Network. Article 6 (August 2011.DOI = 10.1145/1993042.199)3048. The results of this experiment show that the proposed initial reputation for the IF algorithm improve the efficiency of the algorithm in terms of the number of iterations until the process has converged. In other words, by providing this initial reputation, the number of iterations for IF algorithm decreases approximately 9% for reciprocal and around 8% for affine discriminant functions in both biased and unbiased conditions. This can be explained by the fact that the new initial reputation is close to the true value of signal and the IF [4]H.-S. Lim, Y.-S. Moon, and E. Bertino, Provenancebased trustworthiness assessment in sensor networks, in Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, ser. DMSN 10, 2010, pp. 2 7. [5] S. Roy, M. Conti, S. Setia,, and S. Jajodia, Secure data aggregation in wireless sensor networks, Information Forensics and Security, IEEE Transactions on, vol. 7, no. 3, pp. 1040 1052, 2012. 233

[6]H.-L. Shi, K. M. Hou, H. ying Zhou, and X. Liu, Energy efficient and fault tolerant multicore wireless sensor network: E2MWSN, in Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, 2011, pp. 1 4. [7] B. Awerbuch, R. Curtmola, D. Holmer, C. Nitarotaru, and H. Rubens, Mitigating byzantine attacks in ad hoc wireless networks, Department of Computer Science, Johns Hopkins University, Tech, Tech. Rep., 2004. [8] X.-Y. Xiao, W.-C. Peng, C.-C. Hung, and W.-C. Lee, Using SensorRanks for in-network detection of faulty readings in wireless sensor networks, in Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access, ser. MobiDE 07, 2007, pp. 1 8. 234