Principles of mobile communication (2nd ed.)
Principles of mobile communication (2nd ed.)
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
Distributed deviation detection in sensor networks
ACM SIGMOD Record
From ethnography to design in a vineyard
Proceedings of the 2003 conference on Designing for user experiences
Spatio-temporal correlation: theory and applications for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: In memroy of Olga Casals
Diagnosing network-wide traffic anomalies
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A Scalable Correlation Aware Aggregation Strategy for Wireless Sensor Networks
WICON '05 Proceedings of the First International Conference on Wireless Internet
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
RANBAR: RANSAC-based resilient aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Spatial correlation-based collaborative medium access control in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Cora: correlation-based resilient aggregation in sensor networks
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Vineyard Computing: Sensor Networks in Agricultural Production
IEEE Pervasive Computing
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this paper, we consider the problem of resilient data aggregation in sensor networks, namely, how to aggregate sensor readings collected by the base station when some of those sensor readings may be compromised. Note that an attacker can easily compromise the reading of a sensor by altering the environmental parameters measured by that sensor. We present a statistical framework that is designed to mitigate the effects of the attacker on the output of the aggregation function. The main novelty of our approach compared to most prior work on resilient data aggregation is that we take advantage of the naturally existing correlation between the readings produced by different sensors. In particular, we show how spatial correlation can be represented in the sensor network data model, and how it can be exploited to increase the resilience of data aggregation. The algorithms presented in this paper are flexible enough to be applied without any special assumption on the distribution of the sensor readings or on the strategy of the attacker. The effectiveness of the algorithms is evaluated analytically considering a typical attacker model with various parameters, and by means of simulation considering a sophisticated attacker.