Authentic query dissemination and data aggregation in WSN

In a public wireless sensor network (WSN), the presence of adversaries that can completely take over some sensor nodes must be taken into account. The adversary may try to use the compromised nodes to inject his own queries or to influence results of legitimate queries, when they are propagated to the network's sink during data concast. Because of the commonly used paradigm of in-network processing, a compromised node can manipulate all passing data easily. Hence, the authenticity of both, query and result, must be verified. However, providing authenticity needs additional effort, which increases energy-consumption. We present AQF+ESAWN, the (to our knowledge) first attempt to provide an integrated solution for authentic query processing and data concast in WSNs in an energy-efficient, configurable way. Before describing the benefits of this demonstration, we shortly sketch the two protocols AQF and ESAWN and the energy-authenticity trade-off provided.

[1]  Felix C. Freiling,et al.  Authenticated query flooding in sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[2]  Martina Zitterbart,et al.  Relaxed authenticity for data aggregation in wireless sensor networks , 2008, SecureComm.

[3]  M. Zitterbart,et al.  ESAWN-NR: Authentic aggregation and non-repudiation in wireless sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.