TY - JOUR
T1 - Secure data aggregation using access control and authentication for wireless sensor networks
AU - Razaque, Abdul
AU - Rizvi, Syed S.
PY - 2017/9/1
Y1 - 2017/9/1
N2 - The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce the secure data aggregation using the access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect sinkhole and Sybil attacks that are difficult to detect by existing cryptographic approaches. The proposed SDAACA protocol consists of two novel algorithms: the secure data fragmentation (SDF) and the node joining authorization (NJA). The SDF algorithm hides the data from the adversary by fragmenting it into small pieces. In the NJA algorithm, an authorization process is initiated before allowing any new node to join the network. Both algorithms help improve the Quality of Service (QoS) parameters. Moreover, we propose an access control scheme that supports accuracy, energy efficiency, freshness and authentication by reducing the communication overhead and guaranteeing the communication authenticity process. Furthermore, the proposed protocol is mapped on the oil-refinery plant to prevent and detect both sinkhole and Sybil attacks in the presence of static and mobile sensor nodes. Finally, we show the effectiveness of our proposed protocol through extensive simulations and a comparative study of other known secure data aggregation protocols.
AB - The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce the secure data aggregation using the access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect sinkhole and Sybil attacks that are difficult to detect by existing cryptographic approaches. The proposed SDAACA protocol consists of two novel algorithms: the secure data fragmentation (SDF) and the node joining authorization (NJA). The SDF algorithm hides the data from the adversary by fragmenting it into small pieces. In the NJA algorithm, an authorization process is initiated before allowing any new node to join the network. Both algorithms help improve the Quality of Service (QoS) parameters. Moreover, we propose an access control scheme that supports accuracy, energy efficiency, freshness and authentication by reducing the communication overhead and guaranteeing the communication authenticity process. Furthermore, the proposed protocol is mapped on the oil-refinery plant to prevent and detect both sinkhole and Sybil attacks in the presence of static and mobile sensor nodes. Finally, we show the effectiveness of our proposed protocol through extensive simulations and a comparative study of other known secure data aggregation protocols.
UR - http://www.scopus.com/inward/record.url?scp=85026819148&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85026819148&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2017.07.001
DO - 10.1016/j.cose.2017.07.001
M3 - Article
AN - SCOPUS:85026819148
SN - 0167-4048
VL - 70
SP - 532
EP - 545
JO - Computers and Security
JF - Computers and Security
ER -