TY - GEN
T1 - Trust-based secure aggregation in wireless sensor networks
AU - Hur, Junbeom
AU - Lee, Yoonho
AU - Hong, Seongmin
AU - Yoon, Hyunsoo
PY - 2005
Y1 - 2005
N2 - Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.
AB - Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.
KW - Resilient sensor networks
KW - Secure aggregation
KW - Security
KW - Trust evaluation
UR - http://www.scopus.com/inward/record.url?scp=77956432336&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77956432336&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:77956432336
SN - 9806560485
SN - 9789806560482
T3 - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
SP - 1
EP - 6
BT - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
PB - International Institute of Informatics and Systemics, IIIS
T2 - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005
Y2 - 24 July 2005 through 27 July 2005
ER -