Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks

Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. This fact calls for special requirements for network protocol design, security assessment models, and energy...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of distributed sensor networks Vol. 16; no. 3; p. 155014772091295
Main Authors Song, Hongtao, Sui, Shanshan, Han, Qilong, Zhang, Hui, Yang, Zaiqiang
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 01.03.2020
Hindawi - SAGE Publishing
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. This fact calls for special requirements for network protocol design, security assessment models, and energy-efficient algorithms. Data aggregation is an effective energy conservation technique, which removes redundant information from the data aggregated from neighbor sensor nodes. How to further improve the effectiveness of data aggregation plays an important role in improving data collection accuracy and reducing the overall network energy consumption. Unfortunately, sensor nodes are normally deployed in an open environment and thus are subject to various attacks conducted by adversaries. Consequently, data aggregation brings new challenges to wireless sensor network security. In this article, we propose a novel secure data aggregation solution based on autoregressive integrated moving average model, a time series analysis technique, to prevent private data from being learned by adversaries. We leverage the autoregressive integrated moving average model to predict the data volume in sensor nodes, and update and synchronize the model as needed. The experimental results demonstrate that our model provides accurate predictions and that, compared with competing methods, our solution achieves better security, lower computation and communication costs, and better flexibility.
ISSN:1550-1329
1550-1477
1550-1477
DOI:10.1177/1550147720912958