Abstract-Efficiency and security are two basic requirements for sensor network design. However, these requirements could be sharply contrary to each other in some scenarios. For example, innetwork data aggregation can significantly reduce communication overhead and thus has been adopted widely as a means to improve network efficiency; however, the adoption of in-network data aggregation may prevent data from being encrypted since it is a prerequisite for aggregation that data be accessible during forwarding. In this paper, we address this dilemma by proposing a family of secret perturbation-based schemes that can protect sensor data confidentiality without disrupting additive data aggregation. Extensive simulations are also conducted to evaluate the proposed schemes. The results show that our schemes provide confidentiality protection for both raw and aggregated data items with an overhead lower than that of existing related schemes.
The hybrid wireless-optical broadband-access network (WOBAN) is a promising architecture for access networks. Although the front-end wireless mesh networks in a WOBAN are self-healing, the back-end passive optical networks do not have survivability due to their tree topology. We propose a cost-effective protection method for WOBAN that deals with network element failures in the optical part of WOBAN. We define the maximum protection with minimum cost (MPMC) problem and show that the problem can be converted to the minimum cost maximum flow (MCMF) problem. We also present an integer linear programming (ILP) model for the MCMF problem. Numerical results are reported for the application of our algorithm to obtain the optimal solutions for different instances of the MPMC problem.
Abstract-Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate the attacks but none can effectively and efficiently identify the intruders. To address the problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. Extensive analysis and simulations using ns2 simulator have been conducted and verified the effectiveness and efficiency of the scheme.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.