Power-aware routing in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A new family of authentication protocols
ACM SIGOPS Operating Systems Review
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Analyzing and modeling encryption overhead for sensor network nodes
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics
IEEE Transactions on Mobile Computing
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Identity certified authentication for ad-hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies
IEEE Transactions on Mobile Computing
System Lifetime Optimization for Heterogeneous Sensor Networks with a Hub-Spoke Topology
IEEE Transactions on Mobile Computing
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
A secure and resilient WSN roadside architecture for intelligent transport systems
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Context-aware multimedia services in a pervasive environment: the Daidalos approach
Proceedings of the 2008 Ambi-Sys workshop on Software Organisation and MonIToring of Ambient Systems
Relaxed authenticity for data aggregation in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Order-Preserving Symmetric Encryption
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Distributed data source verification in wireless sensor networks
Information Fusion
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure hierarchical data aggregation in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Provably secure framework for information aggregation in sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Secure encrypted-data aggregation for wireless sensor networks
Wireless Networks
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient and optimally secure in-network aggregation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
Journal of Systems and Software
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Re-visited: denial of service resilient access control for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Secure Distributed Data Aggregation
Foundations and Trends in Databases
Order-Preserving encryption for non-uniformly distributed plaintexts
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
Information Fusion
An attack on privacy preserving data aggregation protocol for wireless sensor networks
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
On the privacy of concealed data aggregation
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Lossy data aggregation integrity scheme in wireless sensor networks
Computers and Electrical Engineering
DARE: evaluating Data Accuracy using node REputation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards Privacy Protection in Smart Grid
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Routing in wireless sensor networks is different from that in commonsense mobile ad-hoc networks. It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem. To save the overall energy resources of the network, sensed data needs to be consolidated and aggregated on its way to the final destination. We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating intermediate nodes are not required to operate on the sensed plaintext data. We apply a particular class of encryption transformations and discuss techniques for computing the aggregation functions "average” and "movement detection.” We show that the approach is feasible for the class of "going down” routing protocols. We consider the risk of corrupted sensor nodes by proposing a key predistribution algorithm that limits an attacker's gain and show how key predistribution and a key-ID sensitive "going down” routing protocol help increase the robustness and reliability of the connected backbone.