SciELO - Scientific Electronic Library Online

 
vol.11 issue2A Reinforcement Learning Solution for Allocating Replicated Fragments in a Distributed DatabaseImage Retrieval Based on Wavelet Transform and Neural Network Classification author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Computación y Sistemas

On-line version ISSN 2007-9737Print version ISSN 1405-5546

Comp. y Sist. vol.11 n.2 Ciudad de México Oct./Dec. 2007

 

Exploiting Redundancy for Secure Data Dissemination in Wireless Sensor Networks

 

Explotando Redundancia para Diseminación Segura de Datos en Redes Inalámbricas de Sensores

 

Luis E. Palafox and J. Antonio García Macías

 

CICESE Research Center Computer Science Department Km. 107 Carretera Tijuana–Ensenada C.P. 22860 Ensenada, B.C., México
e–mail:
palafox@cicese.mx , jagm@cicese.mx

 

Article received on June 18, 2007; accepted on October 24, 2007

 

Abstract.

Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical clustered sensor networks that integrates security and reduces communication overhead by removing data redundancy from the network. Furthermore, we show that by using our protocol we can provide security to the network without spending additional energy resources, particularly when we are dealing with high levels of redundancy. Additionally, a military monitoring application is introduced as a case study to evaluate the functionality of our protocol.

Keywords: Secure data dissemination, secure data aggregation, redundancy in WSN.

 

Resumen.

El monitoreo del medio ambiente es una de las muchas aplicaciones de las redes inalámbricas de sensores. Dado que estas redes están densamente pobladas y que las variaciones locales de variables ambientales son pequeñas, los nodos de sensado generan una gran cantidad de datos redundantes. En este artículo se presenta un protocolo de diseminación de datos en una red de sensores jerárquica con clusters, el cual integra seguridad y reduce el sobrecosto de comunicación al remover datos redundantes de la red. Además, se muestra que al utilizar el protocolo se puede proveer de seguridad a la red sin consumir recursos energéticos adicionales, esto particularmente cuando se trata con altos niveles de redundancia. Adicionalmente, se introduce una aplicación de monitoreo militar como caso de estudio para evaluar la funcionalidad de nuestro protocolo.

Palabras clave: Diseminación segura de datos, agregación segura de datos, redundancia en redes inalámbricas de sensores.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

References

1. Banerjee, S. and S. Khuller, "A clustering scheme for hierarchical control in multi–hop wireless networks". In INFOCOM, 2001, pp. 1028–1037.        [ Links ]

2. Bellare, M., R. Canetti and H. Krawczyk, "Keying hash functions for message Authentication". In CRYPTO, edited by N. Koblitz, Vol. 1109 of Lecture Notes in Computer Science, Springer, 1996, pp. 1–15.        [ Links ]

3. Bellare, M., J. Kilian and P. Rogaway, "The security of the cipher block chaining message authentication code". Journal of Computer and System Sciences 61 (3) (2000) 362–399.        [ Links ]

4. Black, J. and P. Rogaway, "CBC MACs for arbitrary–length messages: The three–key constructions". Journal of Cryptology 18 (2) (2005) 111–131.        [ Links ]

5. Çam, H., D. Muthuavinashiappan and P. Nair, "Energy efficient security protocol for wireless sensor networks". In Proceedings of the IEEE VTC Conference, IEEE Computer Society, 2003, pp. 2981–2984.        [ Links ]

6. Çam, H., S. Özdemir, P. Nair, D. Muthuavinashiappan and H. O. Sanli, "Energy–efficient secure pattern based data aggregation for wireless sensor networks". Computer Communications 29 (4) (2006) 446–455.        [ Links ]

7. Daemen, J. and V. Rijmen, "Rijndael for AES". In AES Candidate Conference, 2000, pp. 343–348.        [ Links ]

8. Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. E. Culler and K. S. J. Pister, "System architecture directions for networked sensors". In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93–104.        [ Links ]

9. IEEE, "802.15.4 – 2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low Rate Wireless Personal Area Networks (LR–WPANs)", IEEE Computer Society Press, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, 2003. URL http://www.ansi.org/        [ Links ]

10. ISO/IEC 9797, "Data cryptographic techniques – Data integrity mechanism using a cryptographic check function employing a block cipher algorithm". International Standards Organization (ISO), 1989. URL http://www.ansi.org/        [ Links ]

11. Mainwaring, A.M., D. E. Culler, J. Polastre, R. Szewczyk and J. Anderson, "Wireless sensor networks for habitat monitoring". In WSNA edited by C. S. Raghavendra and K. M. Sivalingam, ACM, 2002, pp. 88–97.        [ Links ]

12. NIST (National Institute of Standards and Technology), "FIPS PUB 180–1: Secure Hash Standard", National Institute for Standards and Technology, Gaithersburg, MD, USA, 1995, supersedes FIPS PUB 180 1993 May 11. URL http://www.itl.nist.gov/fipspubs/fiP180–.htm        [ Links ]

13. NIST (National Institute of Standards and Technology), "FIPS PUB 46–3: Data Encryption Standard (DES)". National Institute for Standards and Technology, Gaithersburg, MD, USA, 1999, supersedes FIPS 46–2. URL http://www.itl.nist.gov/fipspubs/fip186–2.pdf        [ Links ]

14. Perrig, A., R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, "SPINS: Security protocols for sensor networks". Wireless Networks 8 (5) (2002) 521–534.        [ Links ]

15. Perrig, A. and J. Tygar, "Secure Broadcast Communication in Wired and Wireless Networks". Kluwer Academic Publishers, 2003.        [ Links ]

16. Rivest, R.L., "The RC5 Encryption Algorithm". In Fast Software Encryption edited by B. Preneel, Vol. 1008 of Lecture Notes in Computer Science, Springer, 1994, pp. 86–96.        [ Links ]

17. Schneier, B., "Applied Cryptography: Protocols, Algorithms, and Source Code in C", 2nd Edition, John Wiley, 1996.        [ Links ]

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License