SecureDAV

A secure data aggregation and verification protocol for sensor networks

Ajay Mahimkar, Theodore S. Rappaport

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Sensor networks include nodes with limited computation and communication capabilities. One of the basic functions of sensor networks is to sense and transmit data to the end users. The resource constraints and security issues pose a challenge to information aggregation in large sensor networks. Bootstrapping keys is another challenge because public key cryptosystems are unsuitable for use in resource-constrained sensor networks. In this paper, we propose a solution by dividing the problem in two domains. First, we present a protocol for establishing cluster keys in sensor networks using verifiable secret sharing. We chose elliptic curve cryptosystems for security because of their smaller key size, faster computations and reductions in processing power. Second, we develop a Secure Data Aggregation and Verification (SecureDAV) protocol that ensures that the base station never accepts faulty aggregate readings. Integrity check of the readings is done using Merkle Hash Trees avoiding over-reliance on the cluster-heads.

Original languageEnglish (US)
Title of host publicationGLOBECOM'04 - IEEE Global Telecommunications Conference
Pages2175-2179
Number of pages5
Volume4
StatePublished - 2004
EventGLOBECOM'04 - IEEE Global Telecommunications Conference - Dallas, TX, United States
Duration: Nov 29 2004Dec 3 2004

Other

OtherGLOBECOM'04 - IEEE Global Telecommunications Conference
CountryUnited States
CityDallas, TX
Period11/29/0412/3/04

Fingerprint

Sensor networks
Agglomeration
Network protocols
Cryptography
Base stations
Communication
Processing

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Mahimkar, A., & Rappaport, T. S. (2004). SecureDAV: A secure data aggregation and verification protocol for sensor networks. In GLOBECOM'04 - IEEE Global Telecommunications Conference (Vol. 4, pp. 2175-2179)

SecureDAV : A secure data aggregation and verification protocol for sensor networks. / Mahimkar, Ajay; Rappaport, Theodore S.

GLOBECOM'04 - IEEE Global Telecommunications Conference. Vol. 4 2004. p. 2175-2179.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mahimkar, A & Rappaport, TS 2004, SecureDAV: A secure data aggregation and verification protocol for sensor networks. in GLOBECOM'04 - IEEE Global Telecommunications Conference. vol. 4, pp. 2175-2179, GLOBECOM'04 - IEEE Global Telecommunications Conference, Dallas, TX, United States, 11/29/04.
Mahimkar A, Rappaport TS. SecureDAV: A secure data aggregation and verification protocol for sensor networks. In GLOBECOM'04 - IEEE Global Telecommunications Conference. Vol. 4. 2004. p. 2175-2179
Mahimkar, Ajay ; Rappaport, Theodore S. / SecureDAV : A secure data aggregation and verification protocol for sensor networks. GLOBECOM'04 - IEEE Global Telecommunications Conference. Vol. 4 2004. pp. 2175-2179
@inproceedings{76a2e453db254f3b8423f797613e4593,
title = "SecureDAV: A secure data aggregation and verification protocol for sensor networks",
abstract = "Sensor networks include nodes with limited computation and communication capabilities. One of the basic functions of sensor networks is to sense and transmit data to the end users. The resource constraints and security issues pose a challenge to information aggregation in large sensor networks. Bootstrapping keys is another challenge because public key cryptosystems are unsuitable for use in resource-constrained sensor networks. In this paper, we propose a solution by dividing the problem in two domains. First, we present a protocol for establishing cluster keys in sensor networks using verifiable secret sharing. We chose elliptic curve cryptosystems for security because of their smaller key size, faster computations and reductions in processing power. Second, we develop a Secure Data Aggregation and Verification (SecureDAV) protocol that ensures that the base station never accepts faulty aggregate readings. Integrity check of the readings is done using Merkle Hash Trees avoiding over-reliance on the cluster-heads.",
author = "Ajay Mahimkar and Rappaport, {Theodore S.}",
year = "2004",
language = "English (US)",
volume = "4",
pages = "2175--2179",
booktitle = "GLOBECOM'04 - IEEE Global Telecommunications Conference",

}

TY - GEN

T1 - SecureDAV

T2 - A secure data aggregation and verification protocol for sensor networks

AU - Mahimkar, Ajay

AU - Rappaport, Theodore S.

PY - 2004

Y1 - 2004

N2 - Sensor networks include nodes with limited computation and communication capabilities. One of the basic functions of sensor networks is to sense and transmit data to the end users. The resource constraints and security issues pose a challenge to information aggregation in large sensor networks. Bootstrapping keys is another challenge because public key cryptosystems are unsuitable for use in resource-constrained sensor networks. In this paper, we propose a solution by dividing the problem in two domains. First, we present a protocol for establishing cluster keys in sensor networks using verifiable secret sharing. We chose elliptic curve cryptosystems for security because of their smaller key size, faster computations and reductions in processing power. Second, we develop a Secure Data Aggregation and Verification (SecureDAV) protocol that ensures that the base station never accepts faulty aggregate readings. Integrity check of the readings is done using Merkle Hash Trees avoiding over-reliance on the cluster-heads.

AB - Sensor networks include nodes with limited computation and communication capabilities. One of the basic functions of sensor networks is to sense and transmit data to the end users. The resource constraints and security issues pose a challenge to information aggregation in large sensor networks. Bootstrapping keys is another challenge because public key cryptosystems are unsuitable for use in resource-constrained sensor networks. In this paper, we propose a solution by dividing the problem in two domains. First, we present a protocol for establishing cluster keys in sensor networks using verifiable secret sharing. We chose elliptic curve cryptosystems for security because of their smaller key size, faster computations and reductions in processing power. Second, we develop a Secure Data Aggregation and Verification (SecureDAV) protocol that ensures that the base station never accepts faulty aggregate readings. Integrity check of the readings is done using Merkle Hash Trees avoiding over-reliance on the cluster-heads.

UR - http://www.scopus.com/inward/record.url?scp=18144428307&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=18144428307&partnerID=8YFLogxK

M3 - Conference contribution

VL - 4

SP - 2175

EP - 2179

BT - GLOBECOM'04 - IEEE Global Telecommunications Conference

ER -