A Wireless Sensor Network (WSN) typically consists of a sink node sometimes referred to as a Base Station and a number of small wirelesssensor nodes. The base station is assumed to be secure with unlimited available energy while the sensor nodes are assumed to be unsecured with limited available energy. The sensor nodes monitor a geographical area and collect sensory information. Sensory information is communicated to the Base Station through Wirelesshop by hop transmissions. To conserve energy this information is aggregated at intermediate sensor nodes by applying a suitable aggregation function on the received data. Aggregation reduces the amount of network traffic which helps to reduce energy consumption on sensor nodes. It however complicates the already existing security challenges for wireless sensor networks and requires new security techniques tailored specifically for this scenario. Providing security to aggregate data in Wireless Sensor Networks is known as Secure Data Aggregation in WSN. were the first few works discussing techniques for secure data aggregation in Wireless Sensor Networks.
Two main security challenges in secure data aggregation are confidentiality and integrity of data. While traditionally encryption is used to provide end to end confidentiality in Wireless Sensor Network (WSN), the aggregators in a secure data aggregation scenario need to decrypt the encrypted data to perform aggregation. This exposes the plaintext at the aggregators, making the data vulnerable to attacks from an adversary. Similarly an aggregator can inject false data into the aggregate and make the base station accept false data. Thus, while data aggregation improves energy efficiency of a network, it complicates the existing security challenges.
^ abCam, H; Ozdemir, S Nair, P Muthuavinashiappan, D (October 2003). "ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks". Sensors2: 732–736.Cite uses deprecated parameters (help)
^ abHu, Lingxuan; David Evans (January 2003). "Secure aggregation for wireless networks". Workshop on Security and Assurance in Ad hoc Networks.
^Przydatek, Bartosz; Dawn Song; Adrian Perrig (2003). "SIA: secure information aggregation in sensor networks". SenSys: 255–265.
^Kumar, Vimal; Sanjay K. Madria (August 2012). "Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis". MDM 12.