2004
DOI: 10.1007/978-3-540-30474-6_10
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Secure Aggregation in Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(38 citation statements)
references
References 10 publications
0
38
0
Order By: Relevance
“…Although some aggregation protocols [5,6] are (optimally) secure against a single corrupted node without corruption of intermediate nodes, these protocols are not optimally secure against multiple corrupted nodes. Some aggregation protocols [1,2,20] are optimally secure against multiple corrupted nodes even if intermediate nodes are corrupted.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although some aggregation protocols [5,6] are (optimally) secure against a single corrupted node without corruption of intermediate nodes, these protocols are not optimally secure against multiple corrupted nodes. Some aggregation protocols [1,2,20] are optimally secure against multiple corrupted nodes even if intermediate nodes are corrupted.…”
Section: Related Workmentioning
confidence: 99%
“…Readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. This process is called in-network aggregation [1][2][3][4][5][6][18][19][20]. Since aggregation reduces the amount of data to be transmitted through the network, it consequently decreases bandwidth consumption and energy depletion.…”
Section: Introductionmentioning
confidence: 99%
“…Although some aggregation protocols [6], [7] are (optimally) secure against a single corrupted node without corruption of intermediate nodes, these protocols are not optimally secure against multiple corrupted nodes. Some aggregation protocols [2], [3], [21] are optimally secure against multiple corrupted nodes even if intermediate nodes are corrupted.…”
Section: Related Workmentioning
confidence: 99%
“…1. This process is called innetwork aggregation [2]- [7], [19]- [21]. Since aggregation reduces the amount of data to be transmitted through the network, it consequently decreases bandwidth consumption and energy depletion.…”
Section: Introductionmentioning
confidence: 99%
“…The second attack can be much more serious since even a single malicious sensor can completely corrupt the final result. Thus the need to make aggregation queries secure against the second attack has been widely acknowledged [1,2,6,10,14,15,18,26,27].…”
Section: Introductionmentioning
confidence: 99%