Collusion attack scenario against for Secure Data Aggregation in WSN
نویسندگان
چکیده
Data aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks in WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance of very low power processors dramatically improves, future aggregator nodes will be capable of performing more sophisticated data aggregation algorithms, thus making WSN less vulnerable. Iterative filtering algorithms hold great promise for such a purpose. Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources, usually in a form of corresponding weight factors assigned to data provided by each source. Demonstrate that several existing iterative filtering algorithms while significantly more robust against collusion attacks than the simple averaging methods, are nevertheless susceptive to a novel sophisticated collusion attack. To address this security issue, improvement for iterative filtering techniques by providing an initial approximation for such algorithms this makes them not only collusion robust, but also more accurate and faster converging. Key wordsWireless sensor networks, robust data aggregation, collusion attacks
منابع مشابه
Iterative Filtering Algorithm Based on Robust Data Aggregation Method for Wireless Sensor Network in the Presence of Adversary Environment
As we have limited computational power and energy resources ,aggregation of data from the multiple sensor node is done at the aggregator node is usually accomplished by simple method is averaging. WSNs are usually unattended and without tamper resistant hardware, they are highly vulnerable to such as node compromising attacks. thus making it necessary to ascertain data trustworthiness and reput...
متن کاملEnergy Efficient Method in Wireless Sensor Network for Securing Compromised Data Aggregation against the Collusion Attack
Due to sensors storage capacity limit, communication bandwidth and computation ability WSN has some limitations. Due to this limited resources the amount of data transmission in network should be reduced. Data aggregation is new method for the above purpose. From the present algorithms for data aggregation the efficient is Iterative Filtering (IF) algorithm, which provides trust evaluation to t...
متن کاملEnergy Efficient Method in Wireless Sensor Network for Securing Compromised Data Aggregation against the Collusion Attack
Due to sensors storage capacity limit, communication bandwidth and computation ability WSN has some limitations. Due to this limited resources the amount of data transmission in network should be reduced. Data aggregation is new method for the above purpose. From the present algorithms for data aggregation the efficient is Iterative Filtering (IF) algorithm, which provides trust evaluation to t...
متن کاملSecure Data Aggregation in Wireless Sensor Network: a survey
Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to ...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کامل