Journal ArticleDOI
Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach
Reads0
Chats0
TLDR
This paper proposes an end-to-end, statistical approach for data authentication that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence.About:Â
This article is published in Pervasive and Mobile Computing.The article was published on 2008-10-01. It has received 93 citations till now. The article focuses on the topics: Watermark & Message authentication code.read more
Citations
More filters
Journal ArticleDOI
Secure data aggregation in wireless sensor networks: A comprehensive overview
Suat Ozdemir,Yang Xiao +1 more
TL;DR: The relationship between security and data aggregation process in wireless sensor networks is investigated and a taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area.
Journal ArticleDOI
Privacy preservation in wireless sensor networks: A state-of-the-art survey
TL;DR: Two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively are reviewed, and a number of important open challenges for future research are discussed.
Journal ArticleDOI
Fast track article: Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence
Marco Conti,Sajal K. Das,Chatschik Bisdikian,Mohan Kumar,Lionel M. Ni,Andrea Passarella,George Roussos,Gerhard Tröster,Gene Tsudik,Franco Zambonelli +9 more
TL;DR: Some of the research issues, challenges and opportunities in the convergence between the cyber and physical worlds are presented, with a goal to stimulate new research activities in the emerging areas of CPW convergence.
Journal ArticleDOI
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network
TL;DR: This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and it has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV).
Proceedings ArticleDOI
SEDA: Scalable Embedded Device Attestation
Nadarajah Asokan,Ferdinand Brasser,Ahmad Ibrahim,Ahmad-Reza Sadeghi,Matthias Schunter,Gene Tsudik,Christian Wachsmann +6 more
TL;DR: This work presents SEDA, the first attestation scheme for device swarms, and introduces a formal security model for swarm attestation and shows security of the approach in this model.
References
More filters
Proceedings ArticleDOI
Energy-efficient communication protocol for wireless microsensor networks
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Energy-efficient communication protocols for wireless microsensor networks
TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI
The Mathematical Theory of Communication
TL;DR: The theory of communication is extended to include a number of new factors, in particular the effect of noise in the channel, and the savings possible due to the statistical structure of the original message anddue to the nature of the final destination of the information.
Proceedings ArticleDOI
Directed diffusion: a scalable and robust communication paradigm for sensor networks
TL;DR: This paper explores and evaluates the use of directed diffusion for a simple remote-surveillance sensor network and its implications for sensing, communication and computation.
Book
Computational Geometry: Algorithms and Applications
TL;DR: In this article, an introduction to computational geometry focusing on algorithms is presented, which is related to particular applications in robotics, graphics, CAD/CAM, and geographic information systems.
Related Papers (5)
Secure data aggregation in wireless sensor networks: A comprehensive overview
Suat Ozdemir,Yang Xiao +1 more