Trust-based secure aggregation in wireless sensor networks

Junbeom Hur, Yoonho Lee, Seongmin Hong, Hyunsoo Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.

Original languageEnglish
Title of host publication3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
PublisherInternational Institute of Informatics and Systemics, IIIS
Pages1-6
Number of pages6
ISBN (Print)9806560485, 9789806560482
Publication statusPublished - 2005
Externally publishedYes
Event3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005 - Austin, TX, United States
Duration: 2005 Jul 242005 Jul 27

Publication series

Name3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
Volume3

Conference

Conference3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005
Country/TerritoryUnited States
CityAustin, TX
Period05/7/2405/7/27

Keywords

  • Resilient sensor networks
  • Secure aggregation
  • Security
  • Trust evaluation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Trust-based secure aggregation in wireless sensor networks'. Together they form a unique fingerprint.

Cite this