2007
DOI: 10.3233/jcs-2007-15104
|View full text |Cite
|
Sign up to set email alerts
|

SIA: Secure information aggregation in sensor networks

Abstract: Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensor nodes often have limited computation and communication resources and battery power. Moreover, in many applications sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the sensor's cryptographic keys.One of the basic and indispensable functionalities of sensor networks i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 123 publications
(66 citation statements)
references
References 43 publications
0
66
0
Order By: Relevance
“…the ordering, and hence top-k ranked data. Now, we extend the model to the case where the aggregator is untrusted, as is the case in the single aggregator model of Chan et al [15]. It is clear that if the aggregate is vulnerable to local data falsification by the data providers, then it is also vulnerable to manipulation by a corrupt aggregator.…”
Section: The Security Of Top-kmentioning
confidence: 99%
See 4 more Smart Citations
“…the ordering, and hence top-k ranked data. Now, we extend the model to the case where the aggregator is untrusted, as is the case in the single aggregator model of Chan et al [15]. It is clear that if the aggregate is vulnerable to local data falsification by the data providers, then it is also vulnerable to manipulation by a corrupt aggregator.…”
Section: The Security Of Top-kmentioning
confidence: 99%
“…Distributed aggregation protocols [1]- [7] are inherently vulnerable to stealthy data modification [14], [15] attacks, severely reducing their utility for critical applications. Extensive work has been carried out in the field of secure aggregation to assure the integrity of aggregates [15]- [20].…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations