TY - GEN
T1 - Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol
AU - Rizvi, Syed
AU - Gualdoni, Joseph
AU - Razaque, Abdul
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/9/5
Y1 - 2018/9/5
N2 - The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce a secure data aggregation using access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect two types of attacks: Sinkhole and Sybil attacks that are difficult to detect by existing cryptographic approaches. The proposed SDAACA protocol consists of two novel algorithms: the secure data fragmentation process and the node authorization process. The first algorithm hides the data from the adversary by fragmenting it into small pieces. In the second algorithm, an authorization process is initiated before allowing any new node to join the network. Moreover, we propose an access control paradigm that supports accuracy, energy efficiency, freshness and authentication by reducing the communication overhead and guaranteeing the communication authenticity process. Furthermore, the proposed protocol is mapped on the oil-refinery plant to prevent and detect both Sinkhole and Sybil attacks in presence of static and mobile sensor nodes. Finally, we show the effectiveness of our proposed protocol through extensive simulations and compared the results against other known similar types of secure data aggregation protocols.
AB - The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce a secure data aggregation using access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect two types of attacks: Sinkhole and Sybil attacks that are difficult to detect by existing cryptographic approaches. The proposed SDAACA protocol consists of two novel algorithms: the secure data fragmentation process and the node authorization process. The first algorithm hides the data from the adversary by fragmenting it into small pieces. In the second algorithm, an authorization process is initiated before allowing any new node to join the network. Moreover, we propose an access control paradigm that supports accuracy, energy efficiency, freshness and authentication by reducing the communication overhead and guaranteeing the communication authenticity process. Furthermore, the proposed protocol is mapped on the oil-refinery plant to prevent and detect both Sinkhole and Sybil attacks in presence of static and mobile sensor nodes. Finally, we show the effectiveness of our proposed protocol through extensive simulations and compared the results against other known similar types of secure data aggregation protocols.
UR - http://www.scopus.com/inward/record.url?scp=85054092638&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85054092638&partnerID=8YFLogxK
U2 - 10.1109/TrustCom/BigDataSE.2018.00105
DO - 10.1109/TrustCom/BigDataSE.2018.00105
M3 - Conference contribution
AN - SCOPUS:85054092638
SN - 9781538643877
T3 - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
SP - 721
EP - 726
BT - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
Y2 - 31 July 2018 through 3 August 2018
ER -