Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Anonymous Data Collection in Sensor Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
IEEE Transactions on Dependable and Secure Computing
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Aggregate message authentication codes
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Data aggregation integrity based on homomorphic primitives in sensor networks
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
A Delay-Efficient Algorithm for Data Aggregation in Multihop Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
A Robust and Secure Aggregation Protocol for Wireless Sensor Networks
DELTA '11 Proceedings of the 2011 Sixth IEEE International Symposium on Electronic Design, Test and Application
International Journal of Sensor Networks
Hi-index | 0.00 |
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. To maximise WSN lifetime, it is essential to minimise the number of bits sent and received by each device. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong the network lifetime. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. In this paper two secure and energy-efficient data aggregation schemes have been proposed; these schemes can detect the malicious nodes. The goal of the algorithms used in these schemes is to ensure that the base station BS does not accept any forged aggregation results. The proposed two protocols present different trade-offs between computations, communication, and security and can fit a wide variety of application areas.