SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Secure Distributed Cluster Formation in Wireless Sensor Networks
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
REEF: a reliable and energy efficient framework for wireless sensor networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
IEEE Communications Magazine
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
This work introduces a novel secure data aggregation framework for Wireless Sensor Networks. It ensures the accuracy of data aggregation value without neglecting energy efficiency, even if all aggregator nodes and some of sensors are compromised in the network. Compared to available solutions in which malicious data aggregation result is rejected by base station and then all steps in aggregation process are cancelled resulting in wasting valuable network resource, our framework relies on adaptive monitoring mechanism that can always provide base station by the correct aggregate result reducing thus total data rejection and providing much higher availability than other security protocols.