Advertisement

Secure and Reliable Data Aggregation for Wireless Sensor Networks

  • Suat Ozdemir
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4836)

Abstract

This paper presents a data aggregation protocol that ensures security and reliability of aggregated data in the presence of compromised sensor nodes. The proposed protocol relies on a novel trust development algorithm which is used by data aggregators and sensor nodes to ensure the reliability of aggregated data and to select secure and reliable paths. Simulation results show that the proposed protocol improves the security and reliability of aggregated data significantly.

Keywords

Sensor Node Wireless Sensor Network Neighboring Node Data Aggregation Communication Overhead 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of network density on Data Aggregation in wireless sensor networks. In: Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J. (eds.) Proc. of the 22nd International Conference on Distributed Computing Systems, pp. 575–578 (July 2002)Google Scholar
  3. 3.
    Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure Data Aggregation in Wireless Sensor Networks: A Survey. In: Proc of PDCAT 2006, pp. 315–320 (December 2006)Google Scholar
  4. 4.
    Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 66–77. ACM Press, Washington, DC (2004)CrossRefGoogle Scholar
  5. 5.
    Casella, G., Berger, R.L.: Statistical Inference. Duxbury Press, Boston, MA (1990)zbMATHGoogle Scholar
  6. 6.
    Roman, R., Zhou, J., Lopez, J.: Applying Intrusion Detection Systems to Wireless Sensor Networks. In: Proc. of Consumer Communications and Networking Conference, Las Vegas, pp. 640–644 (January 2006)Google Scholar
  7. 7.
    Chang, J., Tassiulas, L.: Energy conserving routing in wireless ad hoc networks. In: Proc. of IEEE Infocom 2000, pp. 22–31 (2000)Google Scholar
  8. 8.
    QualNet Network Simulator by Scalable Network Technologies, www.scalable-networks.com/

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Suat Ozdemir
    • 1
  1. 1.Department of Computer Engineering, Faculty of Engineering and Architecture, Gazi University, Ankara, 06570Turkey

Personalised recommendations