Skip to main content

Secure Feedback Service in Wireless Sensor Networks

  • Conference paper
Information Security Practice and Experience (ISPEC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4464))

Abstract

In many sensor network applications, it is critical for the base station to know the delivery (or execution) status of its broadcast messages (or commands). One straightforward way to do so is to let every sensor node send an authenticated acknowledgement (ACK) to the BS directly. However this naive solution is highly communication inefficient and may result in severe ACK implosion near the BS. In this paper, we propose a communication efficient scheme to provide secure feedback service in sensor networks. In our basic scheme, we use ACK aggregation to reduce the ACK traffic. Meanwhile we store audit information for each aggregation operation so that the BS can use the audit information to locate errors in the network. We further improve the basic scheme by constructing a balanced aggregation tree to reduce localization delay and using Bloom filters to reduce storage requirement in each sensor for storing audit information. We analyze the performance of the proposed scheme and show it achieves good bandwidth gain over the naive approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: ACM CCS’06 (Nov. 2006)

    Google Scholar 

  2. Barr, K., Asanovic, K.: Energy aware lossless data compression. In: Proc. of MobiSys’03, San Francisco, CA (May 2003)

    Google Scholar 

  3. Bloom, B.: Space/time tradeoffs in hash coding with allowable errors. Communication of the ACM 13(7), 422–426 (1970)

    Article  MATH  Google Scholar 

  4. Boldyreva, A.: Efficient threshold signature, multisignature and blind signature scheme based on the gap-Diffe-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Boneh, D., et al.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Jarecki, S., et al.: A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 193–207. Springer, Heidelberg (2005)

    Google Scholar 

  7. Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless networks. In: Mobile and Ubiquitous Systems: Networking and Services MobiQuitous 2005 (July 2005)

    Google Scholar 

  8. Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Workshop on Security and Assurance in Ad Hoc Networks (2003)

    Google Scholar 

  9. Lin, W., Chang, S.M., Shieh, S.P.: An efficient broadcast authentication scheme in wireless sensor networks. In: ASIACCS (2006)

    Google Scholar 

  10. Intanagonwiwat, C., et al.: Impact of network density on data aggregation in wireless sensor networks. In: ICDCS’02, pp. 457–458 (2002)

    Google Scholar 

  11. Ostrovsky, R., et al.: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465–485. Springer, Heidelberg (2006)

    Google Scholar 

  12. Lysyanskaya, A., et al.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 245–254. Springer, Heidelberg (2004)

    Google Scholar 

  13. Madden, S., et al.: TAG: a tiny aggregation services for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)

    Article  Google Scholar 

  14. McCune, J., et al.: Detection of Denial-of-Message Attacks on Sensor Network Broadbasts. In: IEEE Symposium on Security and Privacy (2005)

    Google Scholar 

  15. Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures. In: Proc. of CCS 2001, pp. 234–254 (2001)

    Google Scholar 

  16. Mitzenmacher, M.: Compressed bloom filters. IEEE/ACM Trans. on Networks, 613-620 (Oct. 2002)

    Google Scholar 

  17. Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Computer Systems 6(4), 432–441 (1998)

    Article  Google Scholar 

  18. Park, S., et al.: A scalable approach for reliable downstream data delivery in wireless sensor networks. In: MobiHoc 2004, May 24-26 (2004)

    Google Scholar 

  19. Perrig, A., et al.: SPINS: Security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  20. Wagner, D.: Resilient aggregation in sensor networks. In: Workshops on Security of Ad Hoc and Sensor Networks (2004)

    Google Scholar 

  21. Yang, Y., et al.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: ACM MOBIHOC’06 (May 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Duncan S. Wong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Ma, D. (2007). Secure Feedback Service in Wireless Sensor Networks. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72163-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72159-8

  • Online ISBN: 978-3-540-72163-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics