Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks

Computer Science – Networking and Internet Architecture

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

9 pages, 3 figures, 2 tables

Scientific paper

A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. In order to secure data aggregation, in this paper we propose three schemes that rely on multipath routing. The first one guarantees data confidentiality through secret sharing, while the second and third ones provide data availability through information dispersal. Based on qualitative analysis and implementation, we show that, by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-664602

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.