Abstract
In many sensor network applications, it is critical for the base station to know the delivery (or execution) status of its broadcast messages (or commands). One straightforward way to do so is to let every sensor node send an authenticated acknowledgement (ACK) to the BS directly. However this naive solution is highly communication inefficient and may result in severe ACK implosion near the BS. In this paper, we propose a communication efficient scheme to provide secure feedback service in sensor networks. In our basic scheme, we use ACK aggregation to reduce the ACK traffic. Meanwhile we store audit information for each aggregation operation so that the BS can use the audit information to locate errors in the network. We further improve the basic scheme by constructing a balanced aggregation tree to reduce localization delay and using Bloom filters to reduce storage requirement in each sensor for storing audit information. We analyze the performance of the proposed scheme and show it achieves good bandwidth gain over the naive approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: ACM CCS’06 (Nov. 2006)
Barr, K., Asanovic, K.: Energy aware lossless data compression. In: Proc. of MobiSys’03, San Francisco, CA (May 2003)
Bloom, B.: Space/time tradeoffs in hash coding with allowable errors. Communication of the ACM 13(7), 422–426 (1970)
Boldyreva, A.: Efficient threshold signature, multisignature and blind signature scheme based on the gap-Diffe-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2002)
Boneh, D., et al.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)
Jarecki, S., et al.: A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 193–207. Springer, Heidelberg (2005)
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless networks. In: Mobile and Ubiquitous Systems: Networking and Services MobiQuitous 2005 (July 2005)
Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Workshop on Security and Assurance in Ad Hoc Networks (2003)
Lin, W., Chang, S.M., Shieh, S.P.: An efficient broadcast authentication scheme in wireless sensor networks. In: ASIACCS (2006)
Intanagonwiwat, C., et al.: Impact of network density on data aggregation in wireless sensor networks. In: ICDCS’02, pp. 457–458 (2002)
Ostrovsky, R., et al.: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465–485. Springer, Heidelberg (2006)
Lysyanskaya, A., et al.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 245–254. Springer, Heidelberg (2004)
Madden, S., et al.: TAG: a tiny aggregation services for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)
McCune, J., et al.: Detection of Denial-of-Message Attacks on Sensor Network Broadbasts. In: IEEE Symposium on Security and Privacy (2005)
Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures. In: Proc. of CCS 2001, pp. 234–254 (2001)
Mitzenmacher, M.: Compressed bloom filters. IEEE/ACM Trans. on Networks, 613-620 (Oct. 2002)
Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Computer Systems 6(4), 432–441 (1998)
Park, S., et al.: A scalable approach for reliable downstream data delivery in wireless sensor networks. In: MobiHoc 2004, May 24-26 (2004)
Perrig, A., et al.: SPINS: Security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Wagner, D.: Resilient aggregation in sensor networks. In: Workshops on Security of Ad Hoc and Sensor Networks (2004)
Yang, Y., et al.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: ACM MOBIHOC’06 (May 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Ma, D. (2007). Secure Feedback Service in Wireless Sensor Networks. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-72163-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72159-8
Online ISBN: 978-3-540-72163-5
eBook Packages: Computer ScienceComputer Science (R0)