Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1460877.1460885acmotherconferencesArticle/Chapter ViewAbstractPublication PagessecurecommConference Proceedingsconference-collections
research-article

Securely computing an approximate median in wireless sensor networks

Published: 22 September 2008 Publication History
  • Get Citation Alerts
  • Abstract

    Wireless Sensor Networks (WSNs) have proven to be useful in many applications, such as military surveillance and environment monitoring. To meet the severe energy constraints in WSNs, some researchers have proposed to use the in-network data aggregation technique (i.e., combining partial results at intermediate nodes during message routing), which significantly reduces the communication overhead. Given the lack of hardware support for tamper resistance and the unattended nature of sensor nodes, sensor network protocols need to be designed with security in mind. Recently, researchers proposed algorithms for securely computing a few aggregates, such as Sum (the sum of the sensed values), Count (number of nodes) and Average. However, to the best of our knowledge, there is no prior work which securely computes the Median, although the Median is considered to be an important aggregate. The contribution of this paper is twofold. We first propose a protocol to compute an approximate Median and verify if it has been falsified by an adversary. Then, we design an attack-resilient algorithm to compute the Median even in the presence of a few compromised nodes. We evaluate the performance and cost of our approach via both analysis and simulation. Our results show that our approach is scalable and efficient.

    References

    [1]
    D. Barbará, W. DuMouchel, C. Faloutsos, P. J. Haas, J. M. Hellerstein, Y. E. Ioannidis, H. V. Jagadish, T. Johnson, R. T. Ng, V. Poosala, K. A. Ross, and K. C. Sevcik. The new jersey data reduction report. IEEE Data Eng. Bull., 20(4):3--45, 1997.
    [2]
    L. Buttyán, P. Schaffer, and I. Vajda. RANBAR: RANSAC-based resilient aggregation in sensor networks. In SASN '06, pages 83--90, 2006.
    [3]
    H. Chan, A. Perrig, and D. Song. Secure hierarchical in-network aggregation in sensor networks. In CCS '06: Proceedings of the 13th ACM Conference on Computer and communications security, pages 278--287, 2006.
    [4]
    J. Considine, F. Li, G. Kollios, and J. Byers. Approximate aggregation techniques for sensor databases. In ICDE '04: Proceedings of the 20th International Conference on Data Engineering, pages 449--460, 2004.
    [5]
    G. Cormode and S. Muthukrishnan. An improved data stream summary: The count-min sketch and its applications. In LATIN '04: Proceedings of Latin American Theoretical Informatics, pages 29--38, 2004.
    [6]
    Crossbow Technology Inc. http://www.xbow.com, 2008.
    [7]
    K. Frikken. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security, pages 68--76, 2008.
    [8]
    W. F. Fung, D. Sun, and J. Gehrke. Cougar: the network is the database. In SIGMOD '02: Proceedings of the 2002 ACM SIGMOD international conference on Management of data, pages 621--621, 2002.
    [9]
    M. Greenwald and S. Khanna. Space-efficient online computation of quantile summaries. In SIGMOD '01: Proceedings of the 2001 ACM SIGMOD international conference on Management of data, pages 58--66, 2001.
    [10]
    M. B. Greenwald and S. Khanna. Power-conserving computation of order-statistics over sensor networks. In PODS '04: Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 275--285, 2004.
    [11]
    Habitat Monitoring on Great Duck Island. http://www.greatduckisland.net/.
    [12]
    R. Jain and I. Chlamtac. The P 2 algorithm for dynamic calculation of quantiles and histograms without storing observations. Communications of the ACM, 28(10):1076--1085, October 1985.
    [13]
    James Reserve Microclimate and Video Remote Sensing. http://www.cens.ucla.edu.
    [14]
    S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG: a tiny aggregation service for ad-hoc sensor networks. In OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation, pages 131--146, 2002.
    [15]
    G. S. Manku, S. Rajagopalan, and B. G. Lindsay. Approximate medians and other quantiles in one pass and with limited memory. SIGMOD Record, 27(2):426--435, 1998.
    [16]
    J. I. Munro and M. S. Paterson. Selection and sorting with limited storage. Theoretical Computer Science, (12):315--323, 1980.
    [17]
    S. Nath, P. B. Gibbons, S. Seshan, and Z. R. Anderson. Synopsis diffusion for robust aggregation in sensor networks. In SenSys '04: Proceedings of the 2nd international conference on embedded networked sensor systems, pages 250--262, 2004.
    [18]
    B. Patt-Shamir. A note on efficient aggregate queries in sensor networks. Theoretical Computer Science, 370(1--3):254--264, 2007.
    [19]
    A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521--534, Sept. 2002.
    [20]
    V. Poosala, P. J. Haas, Y. E. Ioannidis, and E. J. Shekita. Improved histograms for selectivity estimation of range predicates. SIGMOD Record, 25(2):294--305, 1996.
    [21]
    S. Roy, M. Conti, S. Setia, and S. Jajodia. Attack-resilient hierarchical data aggregation in sensor networks. Technical report, Center for Secure Information Systems - George Mason University (http://mason.gmu.edu/~sroy1/tr-median.pdf), March 2008.
    [22]
    S. Roy, S. Setia, and S. Jajodia. Attack-resilient hierarchical data aggregation in sensor networks. In SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pages 71--82, 2006.
    [23]
    N. Shrivastava, C. Buragohain, D. Agrawal, and S. Suri. Medians and beyond: new aggregation techniques for sensor networks. In SenSys '04: Proceedings of the 2nd international conference on embedded networked sensor systems, pages 239--249, 2004.
    [24]
    The Firebug Project. http://firebug.sourceforge.net.
    [25]
    D. Wagner. Resilient aggregation in sensor networks. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 78--87, 2004.
    [26]
    Y. Yang, X. Wang, S. Zhu, and G. Cao. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In MobiHoc '06: Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, pages 356--367, 2006.
    [27]
    S. Zhu, S. Setia, and S. Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62--72, 2003.

    Cited By

    View all
    • (2023)B-hash: An Adaptive Hybrid Index for In-Memory Time-Series DatabasesProceedings of the VLDB Endowment10.14778/3583140.358314316:6(1235-1248)Online publication date: 1-Feb-2023
    • (2020)DORS: A data overhead reduction scheme for hybrid networks in smart citiesInternational Journal of Communication Systems10.1002/dac.443533:12Online publication date: 22-Apr-2020
    • (2019)Filter based continuous median query algorithm in sensor networkJournal of Computational Methods in Sciences and Engineering10.3233/JCM-19001319:3(695-706)Online publication date: 17-Jul-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SecureComm '08: Proceedings of the 4th international conference on Security and privacy in communication netowrks
    September 2008
    329 pages
    ISBN:9781605582412
    DOI:10.1145/1460877
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Create-Net
    • INRIA: Institut Natl de Recherche en Info et en Automatique

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 September 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attack-resilient
    2. data aggregation
    3. hierarchical aggregation
    4. sensor network security

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    Securecomm08
    Sponsor:
    • INRIA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)B-hash: An Adaptive Hybrid Index for In-Memory Time-Series DatabasesProceedings of the VLDB Endowment10.14778/3583140.358314316:6(1235-1248)Online publication date: 1-Feb-2023
    • (2020)DORS: A data overhead reduction scheme for hybrid networks in smart citiesInternational Journal of Communication Systems10.1002/dac.443533:12Online publication date: 22-Apr-2020
    • (2019)Filter based continuous median query algorithm in sensor networkJournal of Computational Methods in Sciences and Engineering10.3233/JCM-19001319:3(695-706)Online publication date: 17-Jul-2019
    • (2019)Secure Data Aggregation in Wireless Sensor Networks: Enumeration Attack and CountermeasureICC 2019 - 2019 IEEE International Conference on Communications (ICC)10.1109/ICC.2019.8761889(1-7)Online publication date: May-2019
    • (2017)Approximate Holistic Aggregation in Wireless Sensor NetworksACM Transactions on Sensor Networks10.1145/302748813:2(1-24)Online publication date: 19-Apr-2017
    • (2014)Secure Continuous Aggregation in Wireless Sensor NetworksIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2013.6325:3(762-774)Online publication date: 1-Mar-2014
    • (2014)Confidential aggregation for wireless transmissionsThe International Conference on Information Networking 2014 (ICOIN2014)10.1109/ICOIN.2014.6799711(390-394)Online publication date: Feb-2014
    • (2013)Cost-Based Quantile Query Processing in Wireless Sensor NetworksProceedings of the 2013 IEEE 14th International Conference on Mobile Data Management - Volume 0110.1109/MDM.2013.33(237-246)Online publication date: 3-Jun-2013
    • (2013)Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing SystemsIEEE Journal on Selected Areas in Communications10.1109/JSAC.2013.SUP.051302431:9(268-278)Online publication date: Sep-2013
    • (2012)Exact In-Network Aggregation with Integrity and ConfidentialityIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2012.6424:10(1760-1773)Online publication date: 1-Oct-2012
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media