Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. In WSN, many of the secure data aggregation works are conducted without addressing the authentication process. It is challenging to implement authentic...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8895963/ |
id |
doaj-1963e796cb7646cf93ec5540987e89df |
---|---|
record_format |
Article |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ahmed Abdulhadi Jasim Mohd Yamani Idna Bin Idris Saadial Razalli Bin Azzuhri Noor Riyadh Issa Noorzaily Bin Mohamed Noor Jagadeesh Kakarla Iraj Sadegh Amiri |
spellingShingle |
Ahmed Abdulhadi Jasim Mohd Yamani Idna Bin Idris Saadial Razalli Bin Azzuhri Noor Riyadh Issa Noorzaily Bin Mohamed Noor Jagadeesh Kakarla Iraj Sadegh Amiri Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model IEEE Access Secure data aggregation access control wireless sensor network energy consumption Sybil attack sinkhole attack |
author_facet |
Ahmed Abdulhadi Jasim Mohd Yamani Idna Bin Idris Saadial Razalli Bin Azzuhri Noor Riyadh Issa Noorzaily Bin Mohamed Noor Jagadeesh Kakarla Iraj Sadegh Amiri |
author_sort |
Ahmed Abdulhadi Jasim |
title |
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model |
title_short |
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model |
title_full |
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model |
title_fullStr |
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model |
title_full_unstemmed |
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model |
title_sort |
secure and energy-efficient data aggregation method based on an access control model |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. In WSN, many of the secure data aggregation works are conducted without addressing the authentication process. It is challenging to implement authentication while preserving the energy consumption in the network. The previous research that focus on these issues have several limitations, such as sharing the security key and the key length with a base station node, and not much attention is given to enhance the authentication of the Medium Access Control (MAC) server. This makes the data aggregation network are exposed to malicious activities. This paper presents a new protocol to address the security and energy issue in Wireless Sensor Network (WSN). This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. The proposed protocol aims to enhance authentication by generating a random value and random timestamp with a secret key. The base station node will verify the fake aggregated data when the packets are received using the generated key earlier. Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. The secure node authentication algorithm prevents attacks from accessing the network. To avoid network delays, the base station node utilizes the distance information between the participating nodes. To ensure the reliability of our proposed method, we simulate two well-known attacks, called Sybil and sinkhole attacks. Several experimental scenarios are conducted to observe their effect. Evaluation metrics such as malicious activity detection rate, energy consumption, end-to-end delay, and resilience time are measured. The performance of the proposed protocol is compared with SDA, SDAT, SDALFA, EESSDA, SDAACA, and EESDA, which is a widely used protocol in the area of secure data aggregation. The simulation results show that the proposed SEEDA method outperforms the existing scheme with 98.84% malicious nodes detection rate, 3.04 joules for energy consumption, the maximum delay of 0.038 seconds, and the resilient time 0.054, 0.075 seconds when 8%,16% of malicious nodes affecting the network. |
topic |
Secure data aggregation access control wireless sensor network energy consumption Sybil attack sinkhole attack |
url |
https://ieeexplore.ieee.org/document/8895963/ |
work_keys_str_mv |
AT ahmedabdulhadijasim secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel AT mohdyamaniidnabinidris secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel AT saadialrazallibinazzuhri secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel AT noorriyadhissa secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel AT noorzailybinmohamednoor secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel AT jagadeeshkakarla secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel AT irajsadeghamiri secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel |
_version_ |
1724187664341532672 |
spelling |
doaj-1963e796cb7646cf93ec5540987e89df2021-03-30T00:53:38ZengIEEEIEEE Access2169-35362019-01-01716432716434310.1109/ACCESS.2019.29529048895963Secure and Energy-Efficient Data Aggregation Method Based on an Access Control ModelAhmed Abdulhadi Jasim0https://orcid.org/0000-0002-4455-1061Mohd Yamani Idna Bin Idris1https://orcid.org/0000-0002-0118-6543Saadial Razalli Bin Azzuhri2https://orcid.org/0000-0001-8603-8840Noor Riyadh Issa3https://orcid.org/0000-0002-9762-7779Noorzaily Bin Mohamed Noor4https://orcid.org/0000-0002-1691-4259Jagadeesh Kakarla5https://orcid.org/0000-0003-2384-6263Iraj Sadegh Amiri6https://orcid.org/0000-0002-9748-8457Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaIndian Institute of Information Technology Design & Manufacturing (IIITDM), Chennai, IndiaComputational Optics Research Group, Advanced Institute of Materials Science, Ton Duc Thang University, Ho Chi Minh City, VietnamWireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. In WSN, many of the secure data aggregation works are conducted without addressing the authentication process. It is challenging to implement authentication while preserving the energy consumption in the network. The previous research that focus on these issues have several limitations, such as sharing the security key and the key length with a base station node, and not much attention is given to enhance the authentication of the Medium Access Control (MAC) server. This makes the data aggregation network are exposed to malicious activities. This paper presents a new protocol to address the security and energy issue in Wireless Sensor Network (WSN). This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. The proposed protocol aims to enhance authentication by generating a random value and random timestamp with a secret key. The base station node will verify the fake aggregated data when the packets are received using the generated key earlier. Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. The secure node authentication algorithm prevents attacks from accessing the network. To avoid network delays, the base station node utilizes the distance information between the participating nodes. To ensure the reliability of our proposed method, we simulate two well-known attacks, called Sybil and sinkhole attacks. Several experimental scenarios are conducted to observe their effect. Evaluation metrics such as malicious activity detection rate, energy consumption, end-to-end delay, and resilience time are measured. The performance of the proposed protocol is compared with SDA, SDAT, SDALFA, EESSDA, SDAACA, and EESDA, which is a widely used protocol in the area of secure data aggregation. The simulation results show that the proposed SEEDA method outperforms the existing scheme with 98.84% malicious nodes detection rate, 3.04 joules for energy consumption, the maximum delay of 0.038 seconds, and the resilient time 0.054, 0.075 seconds when 8%,16% of malicious nodes affecting the network.https://ieeexplore.ieee.org/document/8895963/Secure data aggregationaccess controlwireless sensor networkenergy consumptionSybil attacksinkhole attack |