SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
ENCAST: Energy-Critical Node Aware Spanning Tree for Sensor Networks
CNSR '05 Proceedings of the 3rd Annual Communication Networks and Services Research Conference
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
THIS: THreshold security for Information aggregation in Sensor networks
ITNG '07 Proceedings of the International Conference on Information Technology
ADCOM '07 Proceedings of the 15th International Conference on Advanced Computing and Communications
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Hi-index | 0.01 |
Data aggregation is an efficient technique for reducing communication cost in wireless sensor networks. However it is vulnerable to false data injection attacks where the adversary node sends false data to the aggregation node and thus, stops the base station to acquire correct data. This paper proposes a secured data aggregation protocol which detects the false data injection during the data aggregation and identifies the adversary node. The protocol is lightweight because it requires only a minimal cryptographic techniques, and takes O(n) time for both data aggregation and tracking back the attacker.