• DocumentCode
    3143377
  • Title

    General secure sensor aggregation in the presence of malicious nodes

  • Author

    Frikken, Keith B. ; Kauffman, Kyle ; Steele, Aaron

  • Author_Institution
    Dept. of Comput. Sci. & Software Eng., Miami Univ., Oxford, OH, USA
  • fYear
    2011
  • fDate
    11-16 April 2011
  • Firstpage
    506
  • Lastpage
    516
  • Abstract
    Sensor networks have the potential to allow users to “query the physical world” by querying the sensor nodes for an aggregate result. However, a concern with such aggregation is that a few corrupt nodes in the network may manipulate the results that the querier sees. There has been a substantial amount of work on providing integrity for sensor network computations. However to the best of our knowledge, this prior work has one or more of the following two limitations: i) the methods only work for a specific aggregation function, or ii) the methods do not consider adversaries whose goal is to prevent the base station and the querier from receiving the result. In this paper we present the first scheme that provides general aggregation for sensor networks in the presence of malicious adversaries. The generality of the scheme results from the ability to securely evaluate any algorithm in the streaming model of computation. The main idea of this paper is to convert the commonly used aggregation tree into an aggregation list, and a process for doing this conversion is also presented. This result is an interesting and important first step towards achieving the realization of general secure querying of a sensor network.
  • Keywords
    telecommunication security; wireless sensor networks; aggregation function; aggregation list; aggregation tree; malicious adversary; malicious nodes; sensor aggregation security; sensor networks; Aggregates; Base stations; Computational modeling; Monitoring; Protocols; Security; Vegetation; Aggregation; Integrity; Sensor Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Data Engineering (ICDE), 2011 IEEE 27th International Conference on
  • Conference_Location
    Hannover
  • ISSN
    1063-6382
  • Print_ISBN
    978-1-4244-8959-6
  • Electronic_ISBN
    1063-6382
  • Type

    conf

  • DOI
    10.1109/ICDE.2011.5767849
  • Filename
    5767849