DocumentCode
3321073
Title
Resilient aggregation with attack detection in sensor networks
Author
Buttyán, Levente ; Schaffer, Peter ; Vajda, Istvan
Author_Institution
Dept. of Telecommun., Budapest Univ. of Technol. & Econ.
fYear
2006
fDate
13-17 March 2006
Lastpage
336
Abstract
In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to detect unexpected deviations before the aggregation function is called. In this model, the adversary does not only want to cause maximal distortion in the output of the aggregation function, but it also wants to remain undetected. The advantage of this approach is that in order to remain undetected, the adversary cannot distort the output arbitrarily, but rather the distortion is usually upper bounded, even for aggregation functions that were considered to be insecure earlier (e.g., the average). We illustrate this through an example in this paper
Keywords
telecommunication security; wireless sensor networks; aggregation function; attack detection; resilient data aggregation; sensor networks; sensor readings; Base stations; Cryptography; Data security; Detectors; Intelligent networks; Laboratories; Resilience; Robustness; Sensor systems; Temperature sensors;
fLanguage
English
Publisher
ieee
Conference_Titel
Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on
Conference_Location
Pisa
Print_ISBN
0-7695-2520-2
Type
conf
DOI
10.1109/PERCOMW.2006.119
Filename
1598998
Link To Document