ICIS '00 Proceedings of the twenty first international conference on Information systems
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Spatio-temporal correlation: theory and applications for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: In memroy of Olga Casals
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Sensor network-based countersniper system
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
Autonomous Agents and Multi-Agent Systems
Achieving Real-Time Target Tracking UsingWireless Sensor Networks
RTAS '06 Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
SENDROM: sensor networks for disaster relief operations management
Wireless Networks
An efficient integrity-preserving scheme for hierarchical sensor aggregation
WiSec '08 Proceedings of the first ACM conference on Wireless network security
SIA: Secure information aggregation in sensor networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
PDCAT '08 Proceedings of the 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies
Efficient and Robust Secure Aggregation for Sensor Networks
NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
Data Fusion in Wireless Sensor Networks
ISECS '09 Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security - Volume 02
Wireless sensor networks for personal health monitoring: Issues and an implementation
Computer Communications
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
In-network aggregation is considered as an efficient way to reduce the energy consumption in wireless sensor networks (WSNs). However, it opens doors for a compromised node to distort the integrity of the aggregated data by altering the data and disrupting transmission of the aggregation results. Thus, several secure data aggregation protocols were designed to mitigate the effect of the node compromise attack and ensure data integrity. Most protocols can detect the manipulation of the aggregation results and then reject them at the base station, which gives a single node compromise the opportunity to disrupt the limited resources in the network. Reputation-based secure data aggregation protocols take a step further in helping to identify compromised nodes as early as possible. However, reputation-based protocols are prone to On-Off attacks (OOs) in which a compromised node is able to affect the aggregation results without being detected. The compromised node behaves maliciously now and then to ensure that its reputation value is within the trustable level. A solution to defeat this attack is proposed in this paper. The significance of the proposal is twofold: (i) it extends Alzaid et al.'s protocol and mitigates the effect of the OO on the aggregation results, and (ii) it considers non-homogeneous environments, which requires distinguishing between abrupt and incipient changes. In a comparative analysis of our proposal with Alzaid et al.'s protocol, plain estimate, and reputation-based estimate shows its superior performance in mitigating the effect of the attack. Copyright © 2011 John Wiley & Sons, Ltd.