A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
The Impact of Data Aggregation in Wireless Sensor Networks
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
OCB: A block-cipher mode of operation for efficient authenticated encryption
ACM Transactions on Information and System Security (TISSEC)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
An efficient key establishment scheme for secure aggregating sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing
RANBAR: RANSAC-based resilient aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
In-network aggregation techniques for wireless sensor networks: a survey
IEEE Wireless Communications
Correctness of sensor network applications by software bounded model checking
FMICS'10 Proceedings of the 15th international conference on Formal methods for industrial critical systems
Hi-index | 0.00 |
In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, and origin, is impossible. Thus, one can either aggregate data and save energy or verify authenticity, not both. We present "ESAWN", a protocol that probabilistically relaxes authenticity in the presence of a fraction of compromised nodes. This enables a trade-off between probabilistic authenticity and probabilistic, energy-saving data aggregation. Besides theoretical analysis, we present MICA2-based simulation results. They indicate that even for high probabilities of authenticity and fraction of compromised nodes, ESAWN is more energy-efficient compared to (100%-)secure but non-aggregating communication. For example, with a fraction of 20% compromised nodes and 90% authenticity, ESAWN saves up to 40% energy.