2011
DOI: 10.1007/s00446-011-0130-z
|View full text |Cite
|
Sign up to set email alerts
|

Secure and highly-available aggregation queries in large-scale sensor networks via set sampling

Abstract: Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In untrusted environments, sensors may potentially be compromised. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation result is corrupted by an attacker. However, the attacker (controlling the compromised sensors) can keep corrupting the result, rendering the system unavailable.This paper aims to enable aggregation queries to tolerate i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 32 publications
(77 reference statements)
0
16
0
Order By: Relevance
“…Extensive work has been carried out in the field of secure aggregation to assure the integrity of aggregates [15]- [20]. However, the work cited imposes severe restrictions on the aggregation system, such as assuming a limited set of aggregation functions, specific data types, a small number of possible adversaries, static networks and imposing expensive integrity assurance protocols that may undermine the scaling properties of distributed aggregation protocols.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Extensive work has been carried out in the field of secure aggregation to assure the integrity of aggregates [15]- [20]. However, the work cited imposes severe restrictions on the aggregation system, such as assuming a limited set of aggregation functions, specific data types, a small number of possible adversaries, static networks and imposing expensive integrity assurance protocols that may undermine the scaling properties of distributed aggregation protocols.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Previous approaches to secure distributed aggregation generally use expensive security protocols or place severe restrictions on the types of networks and services they support [15]- [20]. By contrast, we propose a simple, modular and low-overhead technique, using established principles of trusted systems [21], [22] to perform distributed aggregation in a secure fashion while preserving the scalability properties of the underlying aggregation protocol.…”
Section: Introductionmentioning
confidence: 99%
“…The above equation can be rewritten as . Together with this equation, (16) can be represented as (17) It can be observed that reflection attack does not work in breaking with higher probability because there are still unknown variables in equations. Thus, unknown variables should be eliminated or correctly guessed.…”
Section: B Securitymentioning
confidence: 99%
“…From the estimation theory point of view, the sensor data cryptography in WSNs is investigated in [1]. The secure aggregation in WSNs is also studied in [8] and [17]. In this paper, we focus on the design of an en-route filtering scheme that can simultaneously defend against false data injection attack, PDoS attack, and false endorsement-based DoS (FEDoS) attack.…”
mentioning
confidence: 99%
“…Haifeng Yu [13] has proposed a tree-testing method of calculation that specifically utilizes to answer the data collection inquiries and gives subjectively enhanced www.ijacsa.thesai.org usefulness in connection to the existing secure data collection techniques. The primary favorable position fathoms an important key test examining by reducing the direct problems into mathematical based problems that uses logarithms as the process models.…”
Section: IImentioning
confidence: 99%