The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
DOI: 10.1007/978-3-540-74767-3_4
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Data Aggregation Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…There have been several protocols introduced for preserving the confidentiality of aggregate results [11], [19], [20], [22]- [24]. This issue is different from what our protocol tries to solve and thus is not considered in this paper.…”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…There have been several protocols introduced for preserving the confidentiality of aggregate results [11], [19], [20], [22]- [24]. This issue is different from what our protocol tries to solve and thus is not considered in this paper.…”
Section: Related Workmentioning
confidence: 96%
“…An adversary is able to replay, modify, delay, drop, and deliver protocol messages out of order as well as inject own messages. However, most aggregation protocols assume that all intermediate nodes are trusted [4]- [15], [17]- [20], [22]- [24] except [2], [3], [16], [21]. A corrupted node can easily modify its own sensor reading.…”
Section: Introductionmentioning
confidence: 99%
“…There have been several protocols introduced for preserving the confidentiality of aggregate results [18,19,10,[21][22][23]. This issue is orthogonal to our protocol and is not considered in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…Both of these schemes didn't consider about violated data which can easily affect the aggregation result, as mentioned in the talks of Wagner D. [22]. Our previous work [19] added Elliptic Curve Diffie Hellman (ECDH) [1,5,12] based message authentication to a PH encryption for checking the data integrity and dropping the malicious data before aggregation. And all these aggregation schemes did not check the malicious data from compromised node and manipulating environment.…”
mentioning
confidence: 96%
“…For providing a robust data aggregation to tolerate malicious sensing data while preserving the efficient data consolidation, we did further work from both encryption and aggregation based on the previous work [19], and we proposed a new PH encryption combined with density data mining. So the sensing nodes can conceal data privacy while the aggregating node can extract the group data distribution from the concealed data, filter out the possible violated data and consolidate dense data according to the group distribution.…”
mentioning
confidence: 99%