首页> 外文会议>ICA3PP 2011;International conference on algorithms and architectures for parallel processing >Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks
【24h】

Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks

机译:无线传感器网络中带有恶意聚合器标识的安全且节能的数据聚合

获取原文

摘要

Data aggregation in wireless sensor networks is employed to reduce the communication overhead and prolong the network lifetime. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. Previous secure data aggregation schemes have tackled this problem from different angles. The goal of those algorithms is to ensure that the Base Station (BS) does not accept any forged aggregation results. But none of them have tried to detect the nodes that inject into the network bogus aggregation results. Moreover, most of them usually have a communication overhead that is (at best) logarithmic per node. In this paper, we propose a secure and energy-efficient data aggregation scheme that can detect the malicious nodes with a constant per node communication overhead. In our solution, all aggregation results are signed with the private keys of the aggregators so that they cannot be altered by others. Nodes on each link additionally use their pairwise shared key for secure communications. Each node receives the aggregation results from its parent (sent by the parent of its parent) and its siblings (via its parent node), and verifies the aggregation result of the parent node. Theoretical analysis on energy consumption and communication overhead accords with our comparison based simulation study over random data aggregation trees.
机译:无线传感器网络中的数据聚合可减少通信开销并延长网络寿命。但是,对手可能会破坏某些传感器节点,并使用它们伪造错误值作为聚合结果。先前的安全数据聚合方案已从不同角度解决了此问题。这些算法的目标是确保基站(BS)不接受任何伪造的聚合结果。但是他们都没有试图检测注入到网络虚假聚合结果中的节点。而且,它们中的大多数通常具有(最多)每个节点对数的通信开销。在本文中,我们提出了一种安全且节能的数据聚合方案,该方案可以以恒定的每节点通信开销检测恶意节点。在我们的解决方案中,所有聚合结果都使用聚合器的私钥签名,因此其他人无法更改它们。每个链接上的节点还使用它们的成对共享密钥进行安全通信。每个节点都从其父级(由其父级的父级发送)及其同级(通过其父级节点)接收聚合结果,并验证父级节点的聚合结果。能耗和通信开销的理论分析符合我们在随机数据聚合树上进行的基于比较的仿真研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号