A security-energy trade-off for authentic aggregation in sensor networks
暂无分享,去创建一个
To reduce energy consumption, aggregation takes place in a wireless sensor network. All measured data is collected and preprocessed multiple times on its way towards a data sink, e.g., a base station. However, aggregation implies new challenges to security: as the sink Anally receives aggregated data, it is difficult to verify not only the aggregate's correctness, but also the origin of the data the aggregate was computed from. In the presence of an attacker in the network, data transmissions and aggregation could have maliciously been modified. Yet, it turns out that in-network aggregation and data authenticity are contradictory communication properties. This research examines the possibility of finding a trade-off between security (authenticity) and energy-savings (aggregation). If the user is willing to accept data's authenticity with ples100% probability, he can still save large amounts of energy compared to authentic communication without aggregation.
[1] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[2] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[3] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[4] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..