{"title":"一种用于无线传感器网络的轻量级安全数据聚合协议","authors":"Hung-Min Sun, Chiung-Hsun Chen, Po-Chi Li","doi":"10.1109/ICPPW.2011.24","DOIUrl":null,"url":null,"abstract":"Data aggregation is a widely used technique in wireless sensor networks. There has been many related work proposed to address the data aggregation. However less of them pay attention to the property of data integrity. An attacker can simply forge data to affect the decision of base station by compromised nodes. We, therefore, propose a lightweight secure data aggregation protocol to find the compromised nodes and help the base station to verify the final results. Finally, we provide detailed security analyses to verify security of our scheme.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks\",\"authors\":\"Hung-Min Sun, Chiung-Hsun Chen, Po-Chi Li\",\"doi\":\"10.1109/ICPPW.2011.24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data aggregation is a widely used technique in wireless sensor networks. There has been many related work proposed to address the data aggregation. However less of them pay attention to the property of data integrity. An attacker can simply forge data to affect the decision of base station by compromised nodes. We, therefore, propose a lightweight secure data aggregation protocol to find the compromised nodes and help the base station to verify the final results. Finally, we provide detailed security analyses to verify security of our scheme.\",\"PeriodicalId\":173271,\"journal\":{\"name\":\"2011 40th International Conference on Parallel Processing Workshops\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 40th International Conference on Parallel Processing Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPPW.2011.24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 40th International Conference on Parallel Processing Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPPW.2011.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks
Data aggregation is a widely used technique in wireless sensor networks. There has been many related work proposed to address the data aggregation. However less of them pay attention to the property of data integrity. An attacker can simply forge data to affect the decision of base station by compromised nodes. We, therefore, propose a lightweight secure data aggregation protocol to find the compromised nodes and help the base station to verify the final results. Finally, we provide detailed security analyses to verify security of our scheme.