Scdap Paper Lava
Scdap Paper Lava
Scdap Paper Lava
Lavanya G*
Research Scholar,
Department of Information Science and Technology,
College of Engineering Guindy,
Anna University, Chennai,
Tamil Nadu, India – 600 025.
E-mail: [email protected]
*Corresponding author
Velammal B L
Associate Professor,
Department of Computer Science and Engineering,
College of Engineering Guindy,
Anna University, Chennai,
Tamil Nadu, India - 600 025.
E-mail: [email protected]
Kulothungan K
Associate Professor,
Department of Information Science and Technology,
College of Engineering Guindy,
Anna University, Chennai,
Tamil Nadu, India - 600 025.
E-mail: [email protected]
Abstract:
A network of real time devices that can sense and transmit the information from the deployed
environment by using multi hop communication is called as Wireless Sensor Network
(WSNs). Despite the rapid advancement of WSN, where an increasing number of physical
devices so called as sensors nodes are connected with each other, providing the improved
security with optimized energy consumption during data transmission, communication and
computation remains huge challenge. In wireless sensor networks, numerous sensor nodes are
deployed in the physical environment to sense and collect the required information from the
given environment. The sensed information are needed to be transmitted from the nodes to
the control station in an energy efficient manner. Data aggregation is one kind of techniques
which will optimize the energy usage in wireless sensor networks during the data
transmission. In data aggregation, the unnecessary data is removed which will significantly
reduce energy of the nodes during data transmission. However, collected data during the data
aggregation should be completely protected and there are various threats that can be launched
by the intruders to carry out unauthorised data access and can cause threat to the integrity of
the network. Therefore, ensuring data security during the data aggregation process is very
important and essential for the security of the network. In this paper, a Secure Cluster based
Data Aggregation Protocol (SCDAP) have been proposed to provide better security through
secure authentication and verification process, and to reduce overall energy consumption of
the network by implementing secure clustering process to eliminate the redundant data in the
network. Moreover, the proposed system is more efficient in generating public and private
keys for effective and secure data transmission and verification process. The proposed system
is experimentally tested in NS3 tool and proves that the proposed system reduces high energy
consumption, computational and communicational cost, end-to-end delay and improves the
packet delivery ratio. Moreover, the proposed system provides better security in the network
when compared to other existing systems during the data aggregation.
Keywords: Wireless Networks, Data Aggregation, Energy Optimization, efficient
Authentication, Key generation.
1. Introduction
Wireless sensor networks is a distributed collection of autonomous tiny sensor nodes which
are deployed in a given geographical location to sense and gather the physical information
from the deployed environment and transmit the gathered information to the control station
by using multi hop communication with radio signal as a communication medium[1].
Generally, the devices of WSN are called smart objects which are able to sense the data from
the deployed environment, process the sensed data and transmit data to other devices based
on by using multi hop communication with collaborative processing. Due to the resource
constrained nature for the nodes in WSNs, providing energy optimization for the nodes of
WSN, is a major challenge [2]. Since the nodes of WSNs sense the information from the
deployed environment and transmit the sensed information to the nearest neighbour by using
multi hop communication. By doing so, the same information has been sent by all the devices
which results in redundant transmission [3]. Due to this concern, the energy consumption of
the nodes in WSNs increases and results in the reduction of lifetime of devices in the
network. Data aggregation is the fundamental mechanism for addressing these issues and
provides better energy optimization in order to enhance the lifetime of the nodes in WSN.
The major goals of data aggregation techniques in the WSN is to optimize the energy
consumption of nodes and to achieve better QoS , which includes low data transmission
latency, high reliability of data , low energy usage, and better consideration of data
priority[4]. In WSN, data aggregation is a smart process that collects and aggregates the data
from numerous deployed sensors and then integrates it using an aggregation function to
reduce the amount of data traffic injected into the system[5]. Indeed, the main idea behind
data aggregation in WSN is to perform aggregation on devices in order to reduce the number
of packets sent to the sink and, as a result, it causes reduction in network energy
consumption[6]. In WSN, data aggregation provides three major benefits for diverse IoT
systems: 1. Decreased injected traffic; 2. significantly reduced data transmission delay; and 3.
Improved energy usage of WSN devices[7]. As a result, utilising data aggregation in the
devices of WSN enhances the life of the nodes in the network[8]. Due to the resource nature
and communication medium of the WSN in an open channel, the devices of WSN are
vulnerable to various types of attacks which are possible in the network during data
aggregation[9]. The intruder can launch various active attacks and passive attacks which can
cause harm to the network in terms of data integrity and launch false data injection during
data aggregation process[10]. By launching the false data injection attack, the data sent
during the data aggregation has been modified by the intruder and incorrect and malicious
data will be transmitted to the base station[11]. By doing so, the intruder gains overall control
of the network and compromises all the nodes during the data aggregation process[12].
Considering all these scenarios, it is very much needed to provide efficient security with
effective authentication during the data aggregation process[13]. Motivated from these
observations, in this paper an efficient Secured Cluster based Data Aggregation Protocol
(SCDAP) protocol has been proposed which is able to provide efficient and secured data
aggregation for the devices of the WSN. Moreover, the proposed SCDAP provides efficient
clustering of nodes, provides efficient route discovery for inter cluster and intra cluster
communication, providing of efficient intermediate authentication by employing efficient key
generation, encryption, decryption and providing efficient generation of signature and
effective validation of generated signature to ensure the better authentication of the devices in
WSN . Moreover, the proposed protocol provides efficient key revocation which prevents the
intruders from launching side channel attack and reply attack during the data aggregation.
2. Literature Survey
Many researchers have proposed numerous methods for providing efficient and secured data
aggregation for the devices in the WSN. Among them Onesimu JA et al.[14] have proposed a
workable Privacy-Preserving Data Collection (PPDC) system. The suggested method
conforms with healthcare security requirements and defends against sybil and other attacks
which aims for quick privacy-preserving data aggregation. This system secures the network
privacy by using the client-server-to-user method. In their work, clustering-based k-
anonymity model with -dissociation is used on the client side to anonymize the sensor nodes'
data. By using this clustering technique, the privacy is therefore guaranteed. In contrast, the
server employs the cluster-combination method to optimize communication costs and
enhance privacy. Lightweight Secure Data Aggregation Scheme in Healthcare Using IoT
(LSDA) was proposed by Othman SB et al. [15] Whereas this unique technique was
described using a homomorphic encryption. The network can filter out erroneous packets and
the nodes can conserve power during the transmission phase if each aggregator checks all the
packets it receives from its member nodes. The LSDA scheme has four major steps namely
encryption, authentication, aggregation, and decryption and verification. The integrity is
checked using a homomorphic MAC algorithm. The proposed system makes it more difficult
for the intruder to compromise the code, take control of the Aggregator, and disrupt or attack
the entire network during the data aggregation. For Wireless Body Area Network (WBAN)
systems, Sharmila AH et al. [16] have developed an Enhanced MAC-based secure delay-
aware Healthcare Monitoring System (E-MHMS). The suggested approach guarantees
efficient and safe data aggregation, with data divided into three categories namely crucial
data, nearly critical data, and normal data. First, each authorised node receives keys from the
base station (BS). The crucial data in E-MHMS is encrypted using the asymmetric RSA
(Rivest-Shamir-Adleman) method before being sent to BS over exclusive channels. The
proposed system is secured using the time-based elliptic curve technique. For every round,
the key is distributed to all the legitimate nodes in the network. E-MHMS can withstand DoS
attacks that affect communication in the network. The limitations are it uses numerous
encryption algorithms, which consumes a lot of energy and causes computational and
communication overhead in the network. In order to provide optimal data flow and secure
patient data gained access control, Arul R et al. [17] have proposed "Multi-Modal Secure
Data Dissemination Framework (MMSDDF)". The goal of the suggested framework is to
lessen sybil attacks and other types of attacks. The blockchain uses timestamps and hash
functions to prevent message tampering by attackers. In order to ensure that credentialed
healthcare providers can get patient health information, the proposed system also includes a
trustworthiness assessment approach for messages. This approach also allows for the
detection of the attack and temporary removal of the malicious node, enabling the malicious
node to be blacklisted upon agreement between the source and destination nodes. The
limitations are the blacklisted list of malicious nodes are maintained on the block chain which
causes overhead in terms computation and communication. To ensure the privacy-preserving
access control on the Internet-of-Medical-Things, Kumar M. et al. [18] have proposed
"Escrow-Free Identity-based Aggregate Sign-encryption system to secure data transmission
(EF-IDASC)" (IoMT). The proposed System's works on three stages are employed to secure
data transmission between each component. Protecting the communications between all
sensor nodes inside and outside the WBAN should come first, followed by securing the
sensor nodes inside the WBAN. Data transmission is protected by the Identity-based
Aggregate SignCryption (EF-IDASC) technique in the proposed system. Although the system
has successfully demonstrated the key security aspects, communication costs are
considerable. Tang W et al [19] have proposed a multi-level aggregation strategy, in
which devices provide health data sign the data and integrates with identity-based signature at
the first level. To protect against differential attacks at a deeper level, healthcare facilities add
noise to the data using differential privacy before sending the ciphertext to the cloud server.
At the third layer, the cloud combines and decrypts the jumbled health data gathered from
numerous healthcare facilities. Security research shows that the method can survive various
attacks. However, the proposed technique provides significant cost computation advances.
LDAC-KS, a lightweight distributed access control system with keyword search, has been
proposed by Yang Yang et al. [20]. The recommended approach enables distributed access
control of protected health data across numerous medical specialties. The method may offer a
useful keyword search tool for cross-domain protected health information. The proposed
system uses minimal data encryption, keyword trapdoor construction, and data recovery by
using a small amount of processing power from the user's terminal. The proposed technique
considerably reduces transmission costs while improving the efficiency of cost computation.
J. Liu et.al [21] have proposed "Verifiable Data Aggregation Scheme (VDAS) for Internet of
Things." In their system, KGC generates cryptographic keys which are employed for
encryption and decryption. The data from the terminal nodes is combined by the aggregator
nodes and appends their own signature to the data being sent using the batch key mechanism.
However, when aggregated data is concatenated by using the batch key approach and when
the signature is added, the size of the data grows, which increases the cost of computation and
communication in the network. S. O. Ogundoy et al. [22] have proposed the system to protect
user identification and conceal the physical location of devices. Additionally, the method
lowers the cost of computation and transmission while defending against a number of
security vulnerabilities. Data anonymity and node authentication are provided through an
anonymous and secure aggregated system (ASAS), which also guarantees the integrity of the
data. The query is sent to the PCS by the terminal nodes for authentication. Following
authentication, FN collects all of the TDs' encrypted messages and aggregates them using the
batch key approach. The combined data is then forwarded to PCS. At the PCS, the cost of
communication is still significant. A time scheduling approach that uses movable sink nodes
to effectively gather data was proposed by Wang et al. [23], where the transmission cost is
minimised by using the minimal spanning tree with each mobile sink node travelling along its
own route. The energy consumption of the system and the transmission latency both grow as
the number of sensor nodes increases. An effective task offloading strategy based on that
encourages mobility was proposed by Ning et al. [24]. A sustainable system that allows job
offloading from the heavily used cloud to the less used one is built using the ball and bins
principle. Additionally, it offers defence against DDoS attacks and only allows authenticated
users to compute data. Sui et al. [25] have created a strong and effective secure aggregation
method that employs hash-based message authentication and ElGamal encryption to
safeguard the confidentiality, integrity, and authenticity of data. However, the discrete
logarithm problem must be resolved during decryption for the ElGamal encryption system
that supports homomorphic operations. Therefore, only small range data aggregation is
supported by the technique. The two other techniques, multipurpose, also have issues with the
constrained data range. The IDAP protocol is proposed by S. Kumar et al. [26] to provide a
data aggregation mechanism for batch key-based verification. The collector node uses the
batch key technique. All smart gadgets transfer data in batches, multiplying it by one after
another, and so forth, before sending it to PCS. However, there is still room for improvement
in the transmission cost of the proposed scheme. In both the aggregate and transmission
phases of PPDA, authors protected the confidentiality of the data. Additionally, the data from
the sensor nodes is aggregated using a batch key approach. The computing cost is increased
by complex multiplication processes. Lin et.al [27] have proposed an innovative
multidimensional privacy-preserving DA approach for wireless sensor networks
which combines the super increasing sequence and perturbation techniques. The privacy of
aggregated data is at risk due to the neighbour sensor node sharing its private key with the
aggregator node. A super increasing sequence of huge primes was established by Lu et al.
[28] and paired with Paillier encryption to provide an effective and privacy-preserving
aggregation strategy (EPPA) for the smart grid. Additionally, to speed up the
multidimensional data encryption process, they utilised the multigeneration pattern. Jia et. al
[29] have proposed a human-factor-aware privacy-preserving aggregation approach, in which
multidimensional data are encrypted by a randomised and a few secret keys, makes use of
safe multiparty computation techniques. This system is unsecure, nevertheless, as multiple
nodes can share the same multidimensional data and leak secret keys. Based on bilinear
pairing cryptography. Liu et al. [30] proposed an anonymous multidimensional DA system in
which reported data are aggregated in plaintext form to allow addition and non-addition
operations. A two-subset DA technique was proposed by Lu et al. [31] that used the
fractional-order group to encrypt various dimensions data. To achieve adaptive contextual
privacy and security in WBAN, context-aware access control and authentication based on
attribute-based sign encryption and identity-based sign encryption have been proposed by A.
Arfaoui [32]. They developed certificateless sign encryption, which ensures that only partial
private keys generated by key generation centres, to address the key escrow issue and prevent
impersonation attacks (KGC).The importance of access control in WBAN has been
highlighted by Hong et al. [33], who combined threshold access policy with attribute-based
encryption (ABE), ciphertext policy attribute-based signature (CP-ABS), and attribute-based
encryption (ABE). A plan for data aggregation from various data sources in e-healthcare IoT
devices has been put forth in another work by Tang et al. [34]. In order to achieve their goals
of protecting patient privacy and providing just rewards for medical data, they used the BGN
cryptosystem with Shamir's secret sharing scheme. Muhamed Turkanoviü et.al [35] have
proposed a key agreement system for the Internet of Things, in which hash functions and
XOR operations lessen the amount of processing that takes place in a limited node. Here, the
gateway node produces a shared password during the pre-deployment stage and sends it via
an insecure channel. As a result, impersonation attacks are caused by the attacker in the
network. The overall observation from the literature survey is that most of the existing data
aggregation protocols fail to provide efficient privacy and enhanced authentication during
data aggregation. Most of the existing data aggregation protocols are subjected to false data
injection attacks and suffer from considerable computation and communication overhead.
Motivated from these observations, in this paper an efficient Secured Cluster based Data
Aggregation Protocol (SCDAP) protocol has been proposed which can able to provide
efficient and secured data aggregation for the nodes in WSN
The main goal of the proposed SCDAP protocol is to provide energy efficient and secured
data aggregation to the devices in WSN. The SCDAP protocol works on five phase’s namely
key generation phase, network cluster formation phase, secured data aggregation phase, data
transmission phase and data reception phase. In key generation phase, the public and private
key are generated by employing Diophantine power equation which is uses all unknown
integers to solve unknown problems. The advantages of using this equation in generation of
keys is to ensure the randomness during key generation and in multiparty key exchange. The
second phase is network cluster formation phase. In this phase, the nodes of the network are
grouped into various clusters and each cluster have the corresponding clusters along with
their cluster members. The third phase is secured data aggregation phase. During this phase,
the data are aggregated by the CH and it is transmitted to the BS in a secured manner with
help of mutual authentication among member nodes to CH and CH to member nodes and
finally CH to Base station. The next phase is data transmission phase. In this phase data is
transmitted in a secured manner by encrypting it with the sender private key and signing them
by employing digital signature algorithm. In data reception phase, the receiver nodes
validates the incoming data by decrypting with their public key and verifies the signature by
using message verification algorithm. If signature is found correct, the received devices
forwards the packets to the next Neighbour nodes else the received packets are discarded by
the receiver nodes in the network.
The initial phase of the proposed system is the key generation phase. The main goal of this
phase is to generate public key and private key for secure data aggregation to the devices in
the WSN. For efficient generation of the Diophantine equation is using all unknown integers
to solve unknown problems in the equation. Equation (1) gives Diophantine power equation.
Algorithm 1 generates public and private keys.
3 3 2 2 3 3 2 2
γ =Ф ( v ) + P + 3Ф ( v ) P +3 Ф ( v ) P−X y −X Q −3 Xy Q −3 X Q ----- (1)
By employing generated public key and private key the encryption and decryption of the
aggregated data takes place for establishing the secured data transmission in the devices
in WSN.
In the network clustering phase, the sink node chooses the Cluster Head (CTH) node based
on sensor nodes Residual energy (Res_Eng), Distance (D) and Throughput (TP) among the
neighbours’ nodes in the network. The Sink node starts the selection process of Cluster Head
(CTH) and makes decisions from n number nodes to generate the efficient clusters in the
network. Algorithm 2 gives cluster head selection.
Step 1: For all clusters formed in the network, store them into a vector CLT as follows
Step 2: For every sensor node in every cluster C, find Distance (D)
D = √❑
The sensor node which is having a high hop distance is selected for the cluster head selection
process.
Step 3: Store Residual energy (Res_Eng) for each sensor nodes in vector as
Then
In this phase, the sensor node which is having high throughput with minimum residual energy
and distance is selected as Cluster Head (CTH). Various clusters are formed based on the two
parameters namely Residual energy and Mean hop count.
N-means Clustering
Begin
TopScore => α
CL (Cn) =C2n;
Else
End
End
End
Cluster = BestCluster
End
End
return BestCluster
End
N-means algorithm takes sensor nodes and maximum number of clusters as an input. The
maximum number of clusters are estimated by the equation (1) which takes the square root
value with half the sensor node size as maximum and two commonly used as minimum.
K= √ ❑ ----- (1)
❑
The (k=2) - means algorithm gives two clusters from the given sensor nodes. In this newly
applied algorithm, clusters are formed based on the Schwarz Information Criterion (SIC)
Score given in the equation (2).
Where Li (N) is log likelihood of sensor nodes and Pi is the number of parameters in Mi
If SIC Score is less than (k=2) – means cluster, then replace the original cluster with their
cluster. Or else, retain the original cluster as it is. Finally, the cluster with best SCI is selected
as Best Cluster.
The next phase of the proposed protocol is secure data aggregation phase. In data aggregation
phase initially CTH collects the sensor nodes information and data which is needed to be
transmitted. Then the Cluster head (CTH) sends all sensed data to the Aggregated Cluster
Head (ACH) and finally ACH sends the data to BS in a secured manner. Algorithm 4 gives
steps to be followed for Cluster head (CTH) collects Sensor nodes information (SNn) and
Algorithm 5 gives the steps to be followed by Cluster head (CTH) sends all sensed data to the
Aggregated Cluster Head (ACH). Algorithm 6 gives the steps to be followed for encrypting
and decrypting the data for providing efficient secured data transmission from ACH to BS.
Overall Agg =( ID Res Eng TP RP SN 1 SN 1 SN 1 SN 1 . .. . . .. . SNn SNn SNn SNn ) + ( ID ACTH CTH 1 CTH 1 . .. . . .CT
// Encryption procedure //
// decryption process//
1. Private Key ( y 3, v) is used to decrypt the cipher text of the original message C (MGS)
received from the source node.
3
MGS(C) = C y mod v ------ (4)
2. Hence, the original message MGS is received in the equation (4).
The equation (4) provides the original data to the required destination node after successful
decryption of the message which is needed to be transmitted to the BS.
Original energy 3J
Total Rounds 55
Energy consumption
40
35
Energy Consumption(mJ)
30
25 Proposed
20 EPPA
EPPADA
15 SLC-DAA
10
5
0
100 150 200 250
Number of Nodes
Figure 1 gives the comparative analysis of overall energy consumption of the sensor nodes
from various existing algorithms. From the figure it is understood that the proposed protocol
provides better communication overhead in the network when compared to other existing
protocols. The proposed employs efficient data aggregation and clustering of sensor nodes for
reducing the overall energy consumption in the network. Thereby the proposed protocol has
significant reduction in both control messages and data messages in the network and reduces
redundant data in the network. By doing so, the proposed protocol reduces the processing of
both control messages and data messages. Hence the proposed system consumes better
energy when compared to other existing protocols.
Communication Overhead
40
Figure 2 gives the comparative analysis of overall communication overhead of the sensor
nodes from various existing algorithms. From the figure, it is understood that the proposed
protocol provides better communication overhead in the network when compared to other
existing protocols. The proposed employs efficient data aggregation and clustering of sensor
nodes for reducing the overall energy consumption in the network. Thereby the proposed
protocol has significant reduction in both control messages and data messages in the network
and reduces redundant data in the network. By doing so, the proposed protocol reduces the
processing of both control messages and data messages. Hence, the proposed protocol has
better communication overhead when it is compared with other existing protocols.
Computational Cost
45
40
Computational Cost (ms)
35
30
Proposed
25 EPPA
20 EPPADA
15 SLC-DAA
10
5
0
100 150 200 250
Number of Nodes
Figure 3: Computational cost
Figure 3 provides better computational cost when compared to other existing protocols. The
proposed protocol uses secure key generation and authentication techniques for secure data
transmission and reception by avoiding malicious activities in the network .By doing so, the
proposed protocol limits the impact of malicious nodes in the network by reducing the packet
drop ratio and increase in the packet delivery ratio. Moreover, the proposed protocol has
significant reduction in both control messages and data messages in the network and reduces
redundant data in the network. By doing so, the proposed protocol reduces the processing of
both control messages and data messages. Hence, the computational cost of the overall
network is reduced by the SCDAP protocol.
End-to-End Delay
35
End-to-End Delay (ms)
30
25 Proposed
20 EPPA
15 EPPADA
10 SLC-DAA
5
0
100 150 200 250
Number of Nodes
Figure 4 provides better end-to-end delay of the proposed protocol when compared it is
compared with other existing protocols. The proposed system uses efficient clustering and
data aggregation of sensor nodes thereby it reduces the propagation delay and queuing delay
in the network in a significant manner. Moreover, the proposed protocol has significant
reduction in both control messages and data messages in the network and reduces redundant
data in the network. By doing so, the proposed protocol reduces the processing of both
control messages and data messages. Hence, the proposed protocol have better end to end
delay when it is compared with other existing protocols.
Packet Deivery Ratio
95
85 Proposed
EPPA
EPPADA
80
SLC-DAA
75
70
100 150 200 250
Number of Nodes
Figure 5 provides better packet delivery ratio for the proposed protocol when it is compared
with other existing protocols. The reason for the improvement is that the proposed system
employs efficient and secured data transmission of data which provides better packet drop
ratio. Moreover, the proposed protocol provides better security defense against various
malicious nodes in the network. Hence, the proposed system better packet delivery ratio in
comparison with other existing protocols.
In this work, SCDAP protocol has been proposed to provide efficient and secure data
aggregation in wireless sensor network. The main aim of the proposed protocol is to reduce
the control messages and data messages sent across the network. The proposed protocol
works in three phase’s namely key generation phase, network clustering phase and secure
data aggregation phase. The proposed protocol is implemented in NS3 network simulator
with realistic simulation parameters. The results of the simulation is compared with other
existing protocols with the performance metrics namely energy consumption, communication
overhead, computational cost, end-to-end delay and packet delivery ratio. From the
simulation results it is understood that the proposed protocols provides better packet delivery
ratio, end-to-end delay and better computational and communicational overhead when it is
compared with other existing protocols. Moreover, the proposed system provides better
defense against various malicious activity in the network. The future work of the proposed
protocol is to provide secure and efficient data aggregation for the nodes which has mobility
in the network and to improve the QoS parameters in the network.
References