Professional Documents
Culture Documents
ABSTRACT
Data aggregation in case of multiple sensor nodes can be achieved using easy and simple method called as aggregating the
node like averaging. This simple method of aggregation is highly vulnerable to node that can trigger attacks. As we know that
Wireless Sensor Network (WSN) is highly vulnerable to attacks, the credibility of data aggregation and the reputation of sensor
nodes are crucial. A low power processor can improve the performance of WSN and the future aggregator nodes will be able to
perform more complicated data aggregation algorithms. In this paper we demonstrate various existing secure data aggregation
algorithms and consider the most significant approach against collusion attacks. To overcome the various security issues we
propose the modified Iterative Filtering (IF) techniques by providing an initial approximation for algorithms that makes it
collusion robust and also faster converging and accurate.
1.INTRODUCTION
Trust & reputation are the two factors been considered as an efficient security mechanism for Wireless Sensor
Networks (WSNs). Though sensor networks are widely used and deployed in many application domains, the collected
data from distributed sensors are still a challenging issue. Iterative Filtering (IF) algorithm is the best option for WSNs
because they eliminate the problem of data aggregation and the data trustworthiness assessment with a single iterative
procedure. There are various IF algorithms in the recent years proposed for trust and reputation systems. These
algorithms show better robustness in their approach than compared to the simple averaging techniques. But these
algorithms do not consider advanced collusion attack scenarios that exist. If the attackers identify the aggregation
algorithm and the parameters involved then the attackers can launch more complicated attacks on WSNs through false
data injected to the compromised nodes. In this paper we research on various collusion attack scenarios against the
existing IF algorithms through false data injection. Through this approach the IF algorithms can become robust against
such complex collusion attacks and we also believe that it can become more robust under other general circumstances
as well. This approach is different from the traditional non iterative statistical sample estimation technique that is non-
robust to false data and can lead to failure of the network. We also propose new approaches for sensor node revocation
and collusion detection.
2.LITERATURE SURVEY
In [2] Chan H., Song D and Perrig A discuss on the secured hierarchical in-network aggregation in case of sensor
networks. This is the first algorithm that to prove a secured hierarchical in network data aggregation. This algorithm
guarantees to detect manipulation of the aggregate through adversary and achieve beyond the direct injection of data
values in the compromised nodes. The adversary can never compromise on misrepresenting intermediate
aggregation computations. The algorithm invites only O(Dlog2 n) node congestion, it supports arbitrary tree-based
aggregator topologies and maintains its resistance against aggregation manipulation. The purpose of the main
algorithm is to SUM the aggregation securely by initiating the adversary to commit to its choice of intermediate
aggregation results first and later have the sensor nodes independently verify their contributions to the aggregate are
correct. They also help to reduce secure MEDIAN, COUNT, and AVERAGE along with the objective. In [3] Ho J.-W.,
Das S and Wright M introduced a fast zone-based node compromise detection method in wireless sensor networks
through sequential hypothesis testing. They need each sensor node to be confirmed regularly and hence it leads to
substantial overhead. To overcome the limitations identified in the existing schemes the authors propose a zone-based
node compromise detection and revocation scheme. The main idea of this scheme is to have sequential hypothesis
testing in order to detect the suspect regions where the compromised nodes are likely to be placed. The network
operator performs software attestation against each sensor nodes present in this suspect region and thus leading to
detection and revocation of the compromised nodes. In addition the detection problem is conducted using a game
theoretic analysis. It firstly derives the optimal strategies of the attacker and defender, now it demonstrates the
attackers gain from node compromise is limited by the defender and this happens when both attacker and defender
follow their optimal strategies. H.-S. Lim et al. [7], addresses the most important and challenging problem in WSN that
is trustworthiness of sensor data. The author developed a game theoretic defense strategy in order to protect sensor
nodes from various attacks and also to assure high level of trustworthiness for the sensed data. The main aim of the
defense strategy is to make sure that majority of the sensor nodes are protected in each attack/defense round.
In [5] Yu X., Kim S., Tang L.-A., Hung C.-C., Peng W.-C and Han J. propose a trustworthiness analysis of sensor
networks called the Cyber-Physical System (CPS) that integrates physical devices with cyber components in order to
form a situation-integrated analytical system to respond intelligently in case of dynamic changes in real world
scenarios. The authors propose a method called the True-Alarm that finds out trustworthy alarms and maximizes the
feasibility of CPS. True-Alarm computes the locations of objects that are responsible for the alarm and then constructs
an object-alarm graph to carry out trustworthiness inferences that is based on linked information in the graph.
4.DATA AGGREGATION
A typical wireless sensor network consists of a large number of sensor nodes to collect application specific information
from the given environment and then transfer information to a base station where data is processed, analyzed, and
finally used by the application. In case of resource constrained networks, the generic approach is to process the data
generated by different sensor nodes jointly and forward it to the base station. This is referred as data aggregation and it
involves combining the data that belong to the same phenomenon. The main purpose of data aggregation is to
maximize network lifetime by minimizing resource consumption of sensor nodes (like bandwidth and battery energy).
In the process of increasing network lifetime, the data aggregation protocols might degrade important quality of
services like latency, data accuracy, fault-tolerance, and security. Hence the efficient data aggregation protocol is
required to handle the challenging tasks. Therefore the protocol designer must trade off between data accuracy, energy
efficiency, latency, security and fault-tolerance. To achieve this trade off, data aggregation techniques are very
particular about how the packets are routed through the network. Therefore the formulation of the sensor network plays
a vital role in the performance of different data aggregation protocols. There are various protocols that allow routing
and aggregation of data packets simultaneously in a network.
5.OUR CONTRIBUTION
The main agenda of data aggregation algorithm is to collect and aggregate data in the most possible energy efficient
manner in order to extend the network life time. Wireless Sensor Network has an attractive method of data gathering in
case of distributed system architectures. Advanced robust Iterative Filtering technique has the solution for all major
problems in data aggregation in case of WSN. IF is capable of performing simultaneous data aggregation from multiple
sources and can provide trust assessment of these sources as well. Through demonstrations it is revealed that iterative
filtering techniques are robust against collusion attacks and hence to address a novel sophisticated collusion attack we
propose and improved iterative filtering technique by providing the initial approximation. This makes them collusion
robust and also more accurate and faster converging.
Once a user registers in the network a valid user can enter into the existing network topology. The user should register
the login credentials and must assign the weight factors based on the number of data that has to be used. Using the IF
technique the sensor error is computed in a wide range of sensor faults and not prone to the described attack. It uses an
estimate of the noise parameters that are obtained from the sensor nodes. The advanced IF schemes are capable to
protect itself from sophisticated collusion attacks by providing an initial estimate of trustworthiness of sensor using the
input. Our contribution to address this vulnerability present in IF algorithm is to utilize the results of the proposed data
aggregation technique as the initial reputation for these algorithms.
The initial weights for all sensor nodes will be estimated based on the distance of sensors readings to the initial
reputation. The aggregated data performs a filtering operation. If any error is identified on the filtering process, then it
first estimates the errors and computes the new variance of data using MLE and then finally transmits the aggregated
data in a secured way.
The four modules involved for secure data aggregation in IF are: Node Configuration.
Performing data aggregation in multiple sources. To find bias and unbiased readings through IF.
To secure data aggregation using IF with the help of initial values. MLE with known variance.
aggregation secure when the individual sensor nodes are compromised and may send false data to the aggregator. We
also assume that each data aggregator has sufficient computational power to run an IF algorithm for data aggregation