18,913 Hits in 5.3 sec

Secure hierarchical in-network aggregation in sensor networks

Haowen Chan, Adrian Perrig, Dawn Song
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
We present the first algorithm for provably secure hierarchical in-network data aggregation.  ...  In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted.  ...  In this paper, we present the first provably secure sensor network data aggregation protocol for general networks and multiple adversarial nodes.  ... 
doi:10.1145/1180405.1180440 dblp:conf/ccs/ChanPS06 fatcat:vprhk5kuq5br5lbaprnhwu54ci

Secure Hierarchical Data Aggregation in Wireless Sensor Networks

Julia Albath, Sanjay Madria
2009 2009 IEEE Wireless Communications and Networking Conference  
Security in wireless sensor networks entails many different challenges. Traditional end-to-end security is not suitable for use with in-network aggregation.  ...  Communication in wireless sensor networks uses the majority of a sensor's limited energy. Using aggregation in wireless sensor network reduces the overall communication cost.  ...  A new protocol for provably secure data aggregation in wireless sensor networks was proposed in [16] .  ... 
doi:10.1109/wcnc.2009.4917960 dblp:conf/wcnc/AlbathM09 fatcat:yzxbpiioyvgm3ofwxclagho7sy

Two Security Layers for Hierarchical Data Aggregation in Sensor Networks [article]

Jacques M. Bahi and Christophe Guyeux and Abdallah Makhoul
2016 arXiv   pre-print
Hence, an end-to-end secure aggregation approach is required to ensure a healthy data reception. In this paper, we propose two layers for secure data aggregation in sensor networks.  ...  However, as sensor networks are often deployed in untrusted and even hostile environments, sensor nodes are prone to node compromise attacks.  ...  Figure 1 : 1 Tree-based data aggregation in sensor networks Figure 2 : 2 Secure data aggregation in sensor networks Figure 3 : 3 Comparison of energy consumption Figure 4 : 4 Two layers secure data  ... 
arXiv:1608.05936v1 fatcat:hdjbl4hbzvalta466crfj2po2u

Energy Constrained Secure Hierarchical Data Aggregation in Wireless Sensor Networks

2012 American Journal of Applied Sciences  
Results: We suggest an Energy Constrained Secure Hierarchical Data Aggregation in Wireless Sensor Networks.  ...  Approach: In the secure data aggregation techniques, reduction in the energy consumption was not elaborated in detail, since aggregator means of connection to sink was either direct or through other aggregators  ...  Based on attackers: In our initial experiment, we vary the number of attackers as 1,2,3,4 and 5 CONCLUSION In this study, we have proposed a secure hierarchical data aggregation in wireless sensor networks  ... 
doi:10.3844/ajassp.2012.858.864 fatcat:vg6ozixhtrefle3ch4p22kk64i

Hierarchical Approach to Secure Data Aggregation in Wireless Sensor Networks

S. Saranya, N. Bharathi
2015 Indian Journal of Science and Technology  
A secure mechanism for aggregating the data has been put forward in which the two stages of verification are performed.  ...  The main objective of this paper is to aggregate the data in a secure way such that the tampering caused by the adversaries can be avoided and these secure authentication mechanisms ensure that the base  ...  Introduction Wireless sensor networks are employed in various security related applications.  ... 
doi:10.17485/ijst/2015/v8i14/62529 fatcat:dq7af3p5ofdrfgdpvo2dyjuqn4

Attack-resilient hierarchical data aggregation in sensor networks

Sankardas Roy, Sanjeev Setia, Sushil Jajodia
2006 Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks - SASN '06  
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communication and hence the energy  ...  However, these aggregation frameworks have been designed without security in mind.  ...  A compromised node M can corrupt the aggregate value computed at the root (i.e., the sink) of the hierarchical aggregation framework in three ways.  ... 
doi:10.1145/1180345.1180355 dblp:conf/sasn/RoySJ06 fatcat:brn2nzeau5hpjktvqrgstflexu

Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks

Vimal Kumar, Sanjay Madria
2010 2010 Eleventh International Conference on Mobile Data Management  
In this paper we study the performance of an end to end secure data aggregation scheme on wireless sensors.  ...  We measure the execution time and energy consumption of various cryptographic functions on the motes and analyze how an end to end scheme increases the network life time in a WSN compared to a hop by hop  ...  Secure hierarchical data aggregation in wireless sensor networks [1] is one such end to end scheme.  ... 
doi:10.1109/mdm.2010.37 dblp:conf/mdm/KumarM10 fatcat:ddidhzwuobgmbciqdfq3oe6ajq

Secure and Energy-Efficient Data Collection in Wireless Sensor Networks

Anfeng Liu, Laurence T. Yang, Motoki Sakai, Mianxiong Dong
2013 International Journal of Distributed Sensor Networks  
Secure routing Multipath security routing protocol [3], hierarchical sensor network security routing protocol [4].  ...  Secure localization Hierarchical sensor network security positioning [7], lightweight security localization method [8].  ...  have been published in this special issue or not on account of the space limitations.  ... 
doi:10.1155/2013/565076 fatcat:bzpnohxzkbhunbkiuseo3m4yqu

Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN

Mukesh Kumar, Kamlesh Dutta
2017 International Journal of Information Security and Privacy  
The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN.  ...  In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node.  ...  wireless sensor network i.e., flat and hierarchical network.  ... 
doi:10.4018/ijisp.2017010103 fatcat:lubnrkks55advojccqoqbuo3ci

The New Method Of Concealed Data Aggregation In Wireless Sensor: A Case Study

M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie
2011 Zenodo  
Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes  ...  Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information.  ...  Therefore, in order to hierarchically aggregate data of the whole network, sensor nodes in the network must share a common key and use it for encryption.  ... 
doi:10.5281/zenodo.1056742 fatcat:qlyemlozobgaxejngr3vl2xgpe

Confidentiality Protecting Hierarchical Concealed Data Aggregation for Wireless Sensor Network using Privacy Homomorphism

2019 International journal of recent technology and engineering  
Security in wireless sensor network is also one of the important issues. Some properties of a WSN make it more harmed by certain types of attackers, compared to traditional wired network.  ...  Sensor nodes radio range is short so they transfer data in a multihop manner to form network which will send network activities to base station.  ...  Security problem in Wireless Sensor Network In wireless sensor networks message authenticity, confidentiality, and integrity are main concerns.  ... 
doi:10.35940/ijrte.b2919.078219 fatcat:k6ajvbp2mner3dij3uiamest4m

Secure In-Network Processing in Sensor Networks [chapter]

Tassos Dimitriou, Ioannis Krontiris
2006 Security in Sensor Networks  
In this chapter we address the challenge of securing innetwork processing, both for aggregating sensor node's measurements and disseminating commands from the aggregators to individual sensor nodes.  ...  In-network processing in large-scale sensor networks has been shown to improve scalability, eliminate information redundancy and increase the lifetime of the network.  ...  In large sensor networks however, where more than one aggregator exist, there is the need to use a hierarchical aggregation model, where aggregation nodes form a tree.  ... 
doi:10.1201/9781420013399.ch11 fatcat:4zzitbql6zbrtckznvfzk4pfhq

Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Networks

Madhav Ingle, PVRD Prasada Rao
2018 International Journal of Electrical and Computer Engineering (IJECE)  
In Wireless Sensor Network (WSN), fact from different sensor nodes is collected at assembling node, which is typically complete via modest procedures such as averaging as inadequate computational power  ...  Thus, purpose of veracity of facts and prestige of sensor nodes is critical for wireless sensor networks.  ...  Dhage done the survey on data aggregation in secured way for wireless sensor networks.  ... 
doi:10.11591/ijece.v8i6.pp5162-5168 fatcat:7jsluhbvhjebnkvvglsfldlhra

Secure Data Aggregation in Wireless Sensor Networks

Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia
2012 IEEE Transactions on Information Forensics and Security  
Secure hierarchical in-network aggregation in sensor networks. In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2006. [6] J. Considine, F. Li, G.  ...  Sensor networks, aggregation, security 1.  ... 
doi:10.1109/tifs.2012.2189568 fatcat:ylbehae4obd45cnny2nko76ici

A Survey on Hierarchical Cluster Based Secure Routing Protocols and Key Management Schemes in Wireless Sensor Networks

Yugashree Bhadane, Pooja Kadam
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Wireless network is a network having large number of sensor nodes and hence called as "Wireless Sensor Network (WSN)". WSN monitors and senses the environment of targeted area.  ...  Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN.  ...  Security Protocols for Sensor Networks Ibriq et al. [33] proposed a Hierarchical Key Establishment Scheme (HIKES). It is an example of BS based scheme.  ... 
doi:10.32628/cseit183810 fatcat:56ikard7rrbklmfudmvgpz7gni
« Previous Showing results 1 — 15 out of 18,913 results