GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)
DOI: 10.1109/glocom.2003.1258475
|View full text |Cite
|
Sign up to set email alerts
|

A witness-based approach for data fusion assurance in wireless sensor networks

Abstract: Abstract-In wireless sensor networks, sensor nodes are spread randomly over the coverage area to collect information of interest. Data fusion is used to process these collected information before they are sent to the base station, the observer of the sensor network. We study the security of the data fusion process in this work. In particular, we propose a witness-based solution to assure the validation of the data sent from data fusion nodes to the base station. We also present the theoretical analysis for the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
110
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 137 publications
(111 citation statements)
references
References 6 publications
(9 reference statements)
1
110
0
Order By: Relevance
“…using a Merkle hash tree), which will be used in a negotiation with the base station to demonstrate the authenticity of the data used to construct the report. Other approaches [27] take advantage of the density of sensor networks by using the nodes in the neighborhood of the aggregator as witnesses. Finally, it is also possible to filter the packets containing the report and the proofs in their way to the base station, hence decreasing the amount of traffic created by false aggregations (e.g.…”
Section: Data Aggregationmentioning
confidence: 99%
“…using a Merkle hash tree), which will be used in a negotiation with the base station to demonstrate the authenticity of the data used to construct the report. Other approaches [27] take advantage of the density of sensor networks by using the nodes in the neighborhood of the aggregator as witnesses. Finally, it is also possible to filter the packets containing the report and the proofs in their way to the base station, hence decreasing the amount of traffic created by false aggregations (e.g.…”
Section: Data Aggregationmentioning
confidence: 99%
“…The simplest approach is a single-aggregator model [7][8][9][10] where each node sends its sensor reading directly to the aggregator (e.g., base station), and then the aggregator computes the final aggregation result. However, these protocols suffer from having a single node with high congestion.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, we choose to substantially depart from most existing approaches [1,2,6,10,14,15,18,27], which typically try to fix the security holes in in-network aggregation. We propose a novel tree sampling protocol that directly uses randomized sampling to answer aggregation queries.…”
Section: Introductionmentioning
confidence: 99%
“…The second attack can be much more serious since even a single malicious sensor can completely corrupt the final result. Thus the need to make aggregation queries secure against the second attack has been widely acknowledged [1,2,6,10,14,15,18,26,27].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation