Beruflich Dokumente
Kultur Dokumente
Learning Objectives
Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand secure aggregation protocols in WSNs
Prerequisites
Module 7 Basic concepts of computer networks Basic concepts of network security
Individual sensor readings are of limit use Forwarding raw information too expensive
Scarce energy Scarce bandwidth
Solution
Combine the data coming from different sources
Eliminate redundancy Minimize the number of transmissions
Aggregation: Summary
[Aggre_1] Section 1 4
What is Aggregation?
Base Station
Wireless Sensor Node Data Transmission
Legend
N J
f(v1, v2, v3) v1
vi
Sensor Measurement
K H
L
v3
M G
A B C
I
v2
Sensor # 1 2 4 5 Goal: Count the number of nodes in the network. Number of children is unknown. 3
1
-
2
-
3
-
4
-
5
-
Time
Scenario: Count
1 2 3
Sensor #
1
1 -
2
-
3
-
4
-
5
-
Time
Goal: Count the number of nodes in the network. Number of children is unknown.
Scenario: Count
1 2 4 3
Sensor #
1
1 1 1+2 -
2
1 1 -
3
1 1 -
4
-
5
-
Time
Goal: Count the number of nodes in the network. Number of children is unknown.
Scenario: Count
1 2 4 5 Goal: Count the number of nodes in the network. Number of children is unknown. 3
Sensor #
1
1 1 1+2 1+2 -
2
1 1
3
1 1
4
1 1 -
5
-
Time
1+ 1+ -
Scenario: Count
1 2 4 5 Goal: Count the number of nodes in the network. Number of children is unknown. 3
Sensor #
1
1 1 1+2 1+2 1+3 -
2
1 1
3
1 1
4
1 1 1+1 -
5
1 1 -
Time
1+ 1+ 1+ 1+ -
Scenario: Count
1 2 4 5 Goal: Count the number of nodes in the network. Number of children is unknown. 3
Sensor #
1
1 1 1+2 1+2 1+3 1+3 -
2
1 1
3
1 1
4
1 1 1+1 1+1 -
5
1 1 1 -
Time
1+ 1+ 1+ 1+
1+2/2 1+2/2 -
Scenario: Count
1 2 4 5 Goal: Count the number of nodes in the network. Number of children is unknown. 3
Sensor #
1
1 1 1+2 1+2 1+3 1+3 1+4
2
1 1
3
1 1
4
1 1 1+1 1+1 1+1
5
1 1 1 1
Time
1+ 1+ 1+ 1+
Scenario: Count
Example Aggregation
Max, Min Count, Sum Average Median
Tiny Aggregation
Distribution phase
Aggregate queries are pushed down into the network
Collection phase
Aggregate values are continuously routed up from children to parents
Energy Consumption
Time v. Current Draw During Query Processing
20
15
Current (mA)
10
0 0 0.5 1
Time (s)
1.5
2.5
Sensors
Epoch Nodeid 0 0 1 1 1 2 1 2 Light Temp Accel Sound 455 389 422 405 x x x x x x x x x x x x
Time is partitioned into epochs of duration i A single aggregate value is produced to combine the readings of all devices during the epoch
Aggregation Queries
2
SELECT AVG(sound) FROM sensors EPOCH DURATION 10s
Epoch 0 1
3
SELECT roomNo, AVG(sound) FROM sensors GROUP BY roomNo HAVING AVG(sound) > 200 EPOCH DURATION 10s
Illustration: Aggregation
SELECT COUNT(*) FROM sensors Sensor #
1 1 2 2 3 4 1 5
Slot 1 1 2
3 4 1
Slot #
3 4 1
Section 4.1 of TAG
Illustration: Aggregation
SELECT COUNT(*) FROM sensors Sensor #
1 1 2 2 2 3 4 1 5
Slot 2 1 2 2 4
Slot #
3 4 1
Illustration: Aggregation
SELECT COUNT(*) FROM sensors Sensor #
1 1 2 2 1 3 2 3 4 1 5
Slot 3 1 1 2 3 3 4
Slot #
3 4 1
Illustration: Aggregation
SELECT COUNT(*) FROM sensors Sensor #
1 1 2 2 1 5 3 2 3 4 1 5
5 1 2
Slot 4
3 4
Slot #
3 4 1
Illustration: Aggregation
SELECT COUNT(*) FROM sensors Sensor #
1 1 2 2 1 5 1 3 2 3 4 1 5
Slot 1 1 2
3 4 1 5
Slot #
3 4 1
How parents choose the duration of the interval in which they will receive values?
Secure Aggregation
Secure Aggregation
It is challenging to design suitable security mechanisms for Wireless Sensor Networks (WSNs)
Stringent resource constraints on energy, processing power, memory, bandwidth, etc.
WSNs need lightweight secure mechanisms We introduce an LCG-based secure aggregation scheme
Efficiency and simplicity
Security Goals
Security Goals
Confidentiality
Sensor data/readings cannot be disclosed to attackers
Integrity
If an adversary modifies a data message, the receiver should be able to detect this tampering
Authenticity
Ensures that data messages come from the intended sender
Assumptions
The existence of a key management scheme WSN nodes can negotiate the key and trust setup
E(A g gr
| M C (A g A gr
A
H,
KHJ ), KHJ )
I H
D C
Notations
A, B, C: Sensor Nodes E(P, K): Encryption of plaintext message P using key K P1|P2: Concatenation of message P1 and P2
MAC(K, P): Message Authentication Code (MAC) of message P using key K X0: seed of the LCG a, b, m: Parameters of the LCG
Assignment
1. Why do we need aggregation in wireless sensor networks? 2. What is the basic idea of TAG? 3. What is the basic idea of LCG-based secure aggregation in wireless sensor networks?