By Topic

Secure continuous aggregation via sampling-based verification in wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Lei Yu ; Dept.of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China ; Jianzhong Li ; Siyao Cheng ; Shuguang Xiong

In-network aggregation provides an energy-efficient way to extract summarization information from sensor networks. Continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of some interesting aggregates. However, for the continuous in-network aggregation in a hostile environment, the adversary could manipulate a series of aggregation results through compromised nodes to fabricate false temporal variation patterns of the aggregates. Existing secure aggregation schemes conduct one individual verification for each aggregation result. Due to the high rate and the long period of a continuous aggregation, directly applying these schemes to detect false temporal variation pattern would incur a great communication cost. In this paper, we identify distinct design issues for protecting continuous in-network aggregation and propose a novel scheme to detect false temporal variation patterns. Compared with the existing schemes, our scheme greatly reduces the communication cost by selecting and checking only a small part of aggregation results to verify the correctness of the temporal variation patterns in a time window. The checking of the aggregation results uses a sampling-based approach, which enables our scheme independent of any particular in-network aggregation protocol. We also propose a series of security mechanisms to protect the sampling process. Both theoretical analysis and simulations show the effectiveness and efficiency of our scheme.

Published in:

INFOCOM, 2011 Proceedings IEEE

Date of Conference:

10-15 April 2011