Abstract | ||
---|---|---|
In this paper we discuss algorithms that allow the concealed data aggregation (CDA) in wireless sensor networks. We describe and evaluate three algorithms that were reported to suit to the WSN scenario. As result of the evaluation, where we emphasize the awareness to potential attack scenarios, we present a brief overview of strengths and weaknesses of the algorithms. Since no algorithm provides all desirable goals, we propose two approaches to cope with the problems. The first is the successive combination of two algorithms. It increases security, while the additional efforts can be minimized by carefully selected parameters. For the second approach we face specific weaknesses and engineer mechanisms that solve the particular issues. With the considered homomorphic message authentication code and a discussion of the id-issue we exemplary evaluate the two biggest issues of the very promising CMT algorithm. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1109/CCNC.2007.45 | 2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3 |
Keywords | DocType | ISSN |
data security,message authentication,wireless sensor networks,wireless sensor network,additives,privacy,cryptography,data aggregation,message authentication code,computer networks | Conference | 2331-9852 |
Citations | PageRank | References |
10 | 0.60 | 9 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Steffen Peter | 1 | 194 | 15.62 |
Krzysztof Piotrowski | 2 | 172 | 14.37 |
Peter Langendoerfer | 3 | 229 | 25.02 |