Network and Parallel Computing Workshops, IFIP International Conference on
Download PDF

Abstract

Data aggregation is a fundamental building block in sensor networks for power-efficient data collecting, thereby it is important to protect it from attack. In this paper, we consider defending against attackers who intend to stealthily change the aggregation value and mislead the base station into accepting arbitrary false aggregation result. The main idea of our solution is independent aggregating and interactive checking. We present our secure aggregation protocol on a cluster tree topology. In this topology, the network is organized as a tree of clusters and each cluster has dual heads. One head acts as a local aggregator, and the other as a supervisor. Our protocol is resilient to compromised aggregator nodes controlled by adversaries and manipulated to report false aggregation results. Compared with similar works in this area, our protocol takes advantage of the broadcast nature of wireless communication media and incurs lower communication overhead.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles