Title :
A Resilient In-Network Data Aggregation Scheme for Wireless Sensor Networks Based on Interleaved Authentication
Author :
Li, Wei ; Li, Qiaoliang
Author_Institution :
Sch. of Comput. & Commun., Hunan Univ., Changsha
Abstract :
Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because WSN often placed in untrust or even hostile environment, so the researches on secure aggregation become meaningful. Most prior works have focus on both data aggregation techniques and security techniques, but the researches on secure data aggregation were still few. In this paper, we focus on the integrality of data aggregation and present a resilient in-network data aggregation scheme for wireless sensor networks deploy in hostile environment.
Keywords :
bandwidth allocation; message authentication; telecommunication security; wireless sensor networks; bandwidth usage; energy utilization; hostile environment; interleaved authentication; resilient in-network data aggregation scheme; wireless sensor network security; Authentication; Bandwidth; Base stations; Costs; Data mining; Data security; Information security; Military computing; Protocols; Wireless sensor networks; WSN; data aggregation; resilient; security;
Conference_Titel :
Knowledge Discovery and Data Mining, 2009. WKDD 2009. Second International Workshop on
Conference_Location :
Moscow
Print_ISBN :
978-0-7695-3543-2
DOI :
10.1109/WKDD.2009.212