Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
SPINS: security protocols for sensor networks
Wireless Networks
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Impact of Network Density on Data Aggregation in Wireless Sensor Networks
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
DRBTS: Distributed Reputation-based Beacon Trust System
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
SIA: Secure information aggregation in sensor networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Statistical trust establishment in wireless sensor networks
ICPADS '07 Proceedings of the 13th International Conference on Parallel and Distributed Systems - Volume 01
Energy-efficient secure pattern based data aggregation for wireless sensor networks
Computer Communications
Data-aggregation techniques in sensor networks: a survey
IEEE Communications Surveys & Tutorials
Designing secure sensor networks
IEEE Wireless Communications
Analysis of multipath Routing-Part I: the effect on the packet delivery ratio
IEEE Transactions on Wireless Communications
IEEE Communications Magazine
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A variable weight based fuzzy data fusion algorithm for WSN
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
Journal of Systems and Software
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
Hi-index | 0.24 |
In wireless sensor networks, compromised sensor nodes aim to distort the integrity of data by sending false data reports, injecting false data during data aggregation, and disrupting transmission of aggregated data. Previously known trust systems rely on general reputation concept to prevent these attacks. However, this paper presents a novel reliable data aggregation and transmission protocol, called RDAT, which is based on the concept of functional reputation. Protocol RDAT improves the reliability of data aggregation and transmission by evaluating each type of sensor node action using a respective functional reputation. In addition, protocol RDAT employs a fault tolerant Reed-Solomon coding scheme based multi path data transmission algorithm to ensure the reliable data transmission to the base station. The simulation results show that protocol RDAT significantly improves the reliability of the data aggregation and transmission in the presence of compromised nodes.