Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A ZKP-based identification scheme for base nodes in wireless sensor networks
Proceedings of the 2005 ACM symposium on Applied computing
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Attack-resilient hierarchical data aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
RANBAR: RANSAC-based resilient aggregation in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
An efficient integrity-preserving scheme for hierarchical sensor aggregation
WiSec '08 Proceedings of the first ACM conference on Wireless network security
International Journal of Sensor Networks
SIA: Secure information aggregation in sensor networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Location-based design for secure and efficient wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
Secure aggregation in a publish-subscribe system
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Relaxed authenticity for data aggregation in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Efficient Handling of Adversary Attacks in Aggregation Applications
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Distributed data source verification in wireless sensor networks
Information Fusion
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
A lightweight secure protocol for wireless sensor networks
Computer Communications
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Secure feedback service in wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
SAPC: a secure aggregation protocol for cluster-based wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Aggregate message authentication codes
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Provably secure framework for information aggregation in sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Secure encrypted-data aggregation for wireless sensor networks
Wireless Networks
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Adaptive security level for data aggregation in wireless sensor networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Data aggregation integrity based on homomorphic primitives in sensor networks
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks
Computer Communications
Efficient and optimally secure in-network aggregation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
IEEE/ACM Transactions on Networking (TON)
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A co-commitment based secure data collection scheme for tiered wireless sensor networks
Journal of Systems Architecture: the EUROMICRO Journal
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
SPDA: a security protocol for data aggregation in large-scale wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Improving sensor network security with information quality
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Congestion lower bounds for secure in-network aggregation
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Secure Distributed Data Aggregation
Foundations and Trends in Databases
Energy efficient authentication strategies for network coding
Concurrency and Computation: Practice & Experience
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
Practical private information aggregation in large networks
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Efficient data aggregation with in-network integrity control for WSN
Journal of Parallel and Distributed Computing
MAC aggregation with message multiplicity
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
An emerging class of important applications uses adhoc wireless networks of low-power sensor devices tomonitor and send information about a possibly hostileenvironment to a powerful base station connected to awired network. To conserve power, intermediate networknodes should aggregate results from individual sensors.However, this opens the risk that a single compromisedsensor device can render the network useless, or worse,mislead the operator into trusting a false reading. Wepresent a protocol that provides a secure aggregationmechanism for wireless networks that is resilient to bothintruder devices and single device key compromises. Ourprotocol is designed to work within the computation,memory and power consumption limits of inexpensivesensor devices, but takes advantage of the properties ofwireless networking, as well as the power asymmetrybetween the devices and the base station.