Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol

Syed Rizvi, Joseph Gualdoni, Abdul Razaque

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce a secure data aggregation using access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect two types of attacks: Sinkhole and Sybil attacks that are difficult to detect by existing cryptographic approaches. The proposed SDAACA protocol consists of two novel algorithms: the secure data fragmentation process and the node authorization process. The first algorithm hides the data from the adversary by fragmenting it into small pieces. In the second algorithm, an authorization process is initiated before allowing any new node to join the network. Moreover, we propose an access control paradigm that supports accuracy, energy efficiency, freshness and authentication by reducing the communication overhead and guaranteeing the communication authenticity process. Furthermore, the proposed protocol is mapped on the oil-refinery plant to prevent and detect both Sinkhole and Sybil attacks in presence of static and mobile sensor nodes. Finally, we show the effectiveness of our proposed protocol through extensive simulations and compared the results against other known similar types of secure data aggregation protocols.

Original languageEnglish (US)
Title of host publicationProceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages721-726
Number of pages6
ISBN (Print)9781538643877
DOIs
StatePublished - Sep 5 2018
Event17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 - New York, United States
Duration: Jul 31 2018Aug 3 2018

Publication series

NameProceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018

Other

Other17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
CountryUnited States
CityNew York
Period7/31/188/3/18

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol'. Together they form a unique fingerprint.

Cite this