SDA-SM: An Efficient Secure Data Aggregation Scheme using Separate MAC across Wireless Sensor Networks
Keywords:WSN, LEACH, secure data aggregation, homomorphic encryption, Message Authentication Code
Securing the aggregated data of the wireless sensor networks (WSNs) is a vital issue to minimize energy consumption and face potential attacks. This paper presents a novel end to end encryption scheme defined as Aggregating Secure Data -Separate MAC (SDA-SM). The importance of the SDA-SM is twofold. First, it separates the secured aggregated data and the message authentication codes (MAC) into two different packets. Second, it transmits these packets in a random separate time-slot according to the scheduling of the TDMA. Moreover, the TDMA applied in the LEACH protocol is modified to adequate to the proposed SDA-SM scheme. The SDA-SM uses MACs to verify the integrity of the aggregated data and uses a sensor protected identifier to authenticate the source of data. The simulation results of the experiments assure the SDA-SM objectives can be achieved with less computation of the communication overheads than earlier techniques. Besides, SDA-SM will be able to accomplish the integrity and confidentiality of accurate aggregated data while saving the energy to prolong the network lifetime.
 Barker, E.; Chen, L.; Davis, R. (2018). Recommendation for Key-Derivation Methods in Key- Establishment Schemes, NIST Special Publication, 800, 56C, 2018. https://doi.org/10.6028/NIST.SP.800-56Cr1
 Boudia, O. R. M.; Senouci, S. M.; Feham, M. (2017). Elliptic curve-based secure multidimensional aggregation for smart grid communications, IEEE Sensors Journal, 17(23), 7750-7757, 2017. https://doi.org/10.1109/JSEN.2017.2720458
 Cui, J.; Shao, L.; Zhong, H.; Xu, Y.; Liu, L. (2018). Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks, Peer-to-Peer Networking and Applications, 11(5), 1022-1037, 2018. https://doi.org/10.1007/s12083-017-0581-5
 Elshrkawey, M.; Elsherif, S. M.; Wahed, M. E. (2018). An enhancement approach for reducing the energy consumption in wireless sensor networks, Journal of King Saud University-Computer and Information Sciences, 30(2), 259-267, 2018. https://doi.org/10.1016/j.jksuci.2017.04.002
 Elsherif, S. M.; Elshrkawey, M.; Wahed, M. E. (2018). An efficient secure scheme for data aggregation in wireless sensor networks using the additive property of complex numbers, Journal of Electronics and Information Technology, Elsevier, 7(12), 2808-2814, 2018.
 Engouang, T. D.; Yun, L. (2013). Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks. In 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), IEEE, 248-252, 2013. https://doi.org/10.1109/IMSNA.2013.6743261
 Harb, H.; Makhoul, A.; Tawbi, S.; Couturier, R. (2017). Comparison of different data aggregation techniques in distributed sensor networks, IEEE Access, 5, 4250-4263, 2017. https://doi.org/10.1109/ACCESS.2017.2681207
 Hasan, M. Z.; Al-Rizzo, H.; Al-Turjman, F. (2017). A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE Communications Surveys & Tutorials, 19(3), 1424-1456., 2017. https://doi.org/10.1109/COMST.2017.2661201
 Khan, T.; Singh, K.; Abdel-Basset, M.; Long, H. V.; Singh, S. P.; Manjul, M. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access, 7, 58221-58240, 2019. https://doi.org/10.1109/ACCESS.2019.2914769
 Li, X.; Chen, D.; Li, C.; Wang, L. (2015). Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks. Sensors, 15(7), 15952-15973, 2015. https://doi.org/10.3390/s150715952
 Li, S.; Kim, J. G.; Han, D. H.; Lee, K. S. (2019). A survey of energy-efficient communication protocols with QoS guarantees in wireless multimedia sensor networks. Sensors, 19(1), 199, 2019. https://doi.org/10.3390/s19010199
 Othman, S. B.; Bahattab, A. A.; Trad, A.; Youssef, H. (2015). Confidentiality and integrity for data aggregation in WSN using homomorphic encryption, Wireless Personal Communications, 80(2), 867-889, 2015. https://doi.org/10.1007/s11277-014-2061-z
 Parmar, K.; Jinwala, D. C. (2014). Aggregate MAC based authentication for secure data aggregation in wireless sensor networks, In International Conference on Intelligent Computing,Springer, Cham., 475-483, 2014. https://doi.org/10.1007/978-3-319-09339-0_48
 Radhappa, H.; Pan, L.; Xi Zheng, J.; Wen, S. (2018). Practical overview of security issues in wireless sensor network applications, International journal of computers and applications, 40(4), 202-213, 2018. https://doi.org/10.1080/1206212X.2017.1398214
 Shim, K. A.; Park, C. M. (2014). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks, IEEE transactions on parallel and distributed systems, 26(8), 2128-2139, 2014. https://doi.org/10.1109/TPDS.2014.2346764
 Sethi, H., Prasad, D., Patel, R. B. (2011). EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. International Journal of Computer Applications, 22(7), 20-25. https://doi.org/10.5120/2595-3605
 Thiagarajan, R. (2020). Energy consumption and network connectivity based on Novel-LEACHPOS protocol networks, Computer Communications, 149, 90-98, 2020. https://doi.org/10.1016/j.comcom.2019.10.006
 Shen, Y.; Guo, C.; Wang, L. (2020). Improved Security Bounds for Generalized Feistel Networks, IACR Transactions on Symmetric Cryptology, 425-457, 2020. https://doi.org/10.46586/tosc.v2020.i1.425-457
 Schneier, B.; Kelsey, J. (1996). Unbalanced Feistel networks and block cipher design. In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 121-144, 1996. https://doi.org/10.1007/3-540-60865-6_49
 Xiao, S.; Li, B.; Yuan, X. (2015). Maximizing precision for energy-efficient data aggregation in wireless sensor networks with lossy links, Ad Hoc Networks, 26, 103-113, 2015. https://doi.org/10.1016/j.adhoc.2014.11.014
 Zhao, X.; Zhu, J.; Liang, X.; Jiang, S.; Chen, Q. (2016). Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks, IET Information Security, 11(2), 82-88, 2016. https://doi.org/10.1049/iet-ifs.2015.0387
 Zhong, H.; Shao, L.; Cui, J.; Xu, Y. (2018). An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. Journal of Parallel and Distributed Computing, 111, 1-12, 2018. https://doi.org/10.1016/j.jpdc.2017.06.019
 Zhou, Q.; Qin, X.; Liu, G.; Cheng, H.; Zhao, H. (2019). An Efficient Privacy and Integrity Preserving Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks. In 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), IEEE, 291-297, 2019. https://doi.org/10.1109/SmartIoT.2019.00051
 Zhou, Q.; Yang, G.; He, L. (2014). An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks, International Journal of Distributed Sensor Networks, 10(1), 962925, 2014. https://doi.org/10.1155/2014/962925
 Zhu, Y. H.; Li, E.; Chi, K.; Tian, X. (2018). Designing prefix code to save energy for wirelessly powered wireless sensor networks, IET Communications, 12(17), 2137-2144, 2018. https://doi.org/10.1049/iet-com.2018.5055
 Zhu, L.; Yang, Z.; Li, M.; Liu, D. (2013). An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks, International Journal of Distributed Sensor Networks, 9(5), 256852, 2013. https://doi.org/10.1155/2013/256852
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.