Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model

Wireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. In WSN, many of the secure data aggregation works are conducted without addressing the authentication process. It is challenging to implement authentic...

Full description

Bibliographic Details
Main Authors: Ahmed Abdulhadi Jasim, Mohd Yamani Idna Bin Idris, Saadial Razalli Bin Azzuhri, Noor Riyadh Issa, Noorzaily Bin Mohamed Noor, Jagadeesh Kakarla, Iraj Sadegh Amiri
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8895963/
id doaj-1963e796cb7646cf93ec5540987e89df
record_format Article
collection DOAJ
language English
format Article
sources DOAJ
author Ahmed Abdulhadi Jasim
Mohd Yamani Idna Bin Idris
Saadial Razalli Bin Azzuhri
Noor Riyadh Issa
Noorzaily Bin Mohamed Noor
Jagadeesh Kakarla
Iraj Sadegh Amiri
spellingShingle Ahmed Abdulhadi Jasim
Mohd Yamani Idna Bin Idris
Saadial Razalli Bin Azzuhri
Noor Riyadh Issa
Noorzaily Bin Mohamed Noor
Jagadeesh Kakarla
Iraj Sadegh Amiri
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
IEEE Access
Secure data aggregation
access control
wireless sensor network
energy consumption
Sybil attack
sinkhole attack
author_facet Ahmed Abdulhadi Jasim
Mohd Yamani Idna Bin Idris
Saadial Razalli Bin Azzuhri
Noor Riyadh Issa
Noorzaily Bin Mohamed Noor
Jagadeesh Kakarla
Iraj Sadegh Amiri
author_sort Ahmed Abdulhadi Jasim
title Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
title_short Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
title_full Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
title_fullStr Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
title_full_unstemmed Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
title_sort secure and energy-efficient data aggregation method based on an access control model
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Wireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. In WSN, many of the secure data aggregation works are conducted without addressing the authentication process. It is challenging to implement authentication while preserving the energy consumption in the network. The previous research that focus on these issues have several limitations, such as sharing the security key and the key length with a base station node, and not much attention is given to enhance the authentication of the Medium Access Control (MAC) server. This makes the data aggregation network are exposed to malicious activities. This paper presents a new protocol to address the security and energy issue in Wireless Sensor Network (WSN). This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. The proposed protocol aims to enhance authentication by generating a random value and random timestamp with a secret key. The base station node will verify the fake aggregated data when the packets are received using the generated key earlier. Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. The secure node authentication algorithm prevents attacks from accessing the network. To avoid network delays, the base station node utilizes the distance information between the participating nodes. To ensure the reliability of our proposed method, we simulate two well-known attacks, called Sybil and sinkhole attacks. Several experimental scenarios are conducted to observe their effect. Evaluation metrics such as malicious activity detection rate, energy consumption, end-to-end delay, and resilience time are measured. The performance of the proposed protocol is compared with SDA, SDAT, SDALFA, EESSDA, SDAACA, and EESDA, which is a widely used protocol in the area of secure data aggregation. The simulation results show that the proposed SEEDA method outperforms the existing scheme with 98.84% malicious nodes detection rate, 3.04 joules for energy consumption, the maximum delay of 0.038 seconds, and the resilient time 0.054, 0.075 seconds when 8%,16% of malicious nodes affecting the network.
topic Secure data aggregation
access control
wireless sensor network
energy consumption
Sybil attack
sinkhole attack
url https://ieeexplore.ieee.org/document/8895963/
work_keys_str_mv AT ahmedabdulhadijasim secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
AT mohdyamaniidnabinidris secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
AT saadialrazallibinazzuhri secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
AT noorriyadhissa secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
AT noorzailybinmohamednoor secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
AT jagadeeshkakarla secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
AT irajsadeghamiri secureandenergyefficientdataaggregationmethodbasedonanaccesscontrolmodel
_version_ 1724187664341532672
spelling doaj-1963e796cb7646cf93ec5540987e89df2021-03-30T00:53:38ZengIEEEIEEE Access2169-35362019-01-01716432716434310.1109/ACCESS.2019.29529048895963Secure and Energy-Efficient Data Aggregation Method Based on an Access Control ModelAhmed Abdulhadi Jasim0https://orcid.org/0000-0002-4455-1061Mohd Yamani Idna Bin Idris1https://orcid.org/0000-0002-0118-6543Saadial Razalli Bin Azzuhri2https://orcid.org/0000-0001-8603-8840Noor Riyadh Issa3https://orcid.org/0000-0002-9762-7779Noorzaily Bin Mohamed Noor4https://orcid.org/0000-0002-1691-4259Jagadeesh Kakarla5https://orcid.org/0000-0003-2384-6263Iraj Sadegh Amiri6https://orcid.org/0000-0002-9748-8457Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, MalaysiaIndian Institute of Information Technology Design & Manufacturing (IIITDM), Chennai, IndiaComputational Optics Research Group, Advanced Institute of Materials Science, Ton Duc Thang University, Ho Chi Minh City, VietnamWireless sensor networks (WSNs) consist of a large number of sensor nodes that are distributed to capture the information about an area of interest. In WSN, many of the secure data aggregation works are conducted without addressing the authentication process. It is challenging to implement authentication while preserving the energy consumption in the network. The previous research that focus on these issues have several limitations, such as sharing the security key and the key length with a base station node, and not much attention is given to enhance the authentication of the Medium Access Control (MAC) server. This makes the data aggregation network are exposed to malicious activities. This paper presents a new protocol to address the security and energy issue in Wireless Sensor Network (WSN). This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. The proposed protocol aims to enhance authentication by generating a random value and random timestamp with a secret key. The base station node will verify the fake aggregated data when the packets are received using the generated key earlier. Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. The secure node authentication algorithm prevents attacks from accessing the network. To avoid network delays, the base station node utilizes the distance information between the participating nodes. To ensure the reliability of our proposed method, we simulate two well-known attacks, called Sybil and sinkhole attacks. Several experimental scenarios are conducted to observe their effect. Evaluation metrics such as malicious activity detection rate, energy consumption, end-to-end delay, and resilience time are measured. The performance of the proposed protocol is compared with SDA, SDAT, SDALFA, EESSDA, SDAACA, and EESDA, which is a widely used protocol in the area of secure data aggregation. The simulation results show that the proposed SEEDA method outperforms the existing scheme with 98.84% malicious nodes detection rate, 3.04 joules for energy consumption, the maximum delay of 0.038 seconds, and the resilient time 0.054, 0.075 seconds when 8%,16% of malicious nodes affecting the network.https://ieeexplore.ieee.org/document/8895963/Secure data aggregationaccess controlwireless sensor networkenergy consumptionSybil attacksinkhole attack