Perfectly anonymous data aggregation in wireless sensor networks

L. Buttyán, Tamás Holczer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some security issues; in particular, aggregator nodes become attractive targets of physical destruction and jamming attacks. In order to mitigate this problem, we propose a new private aggregator node election protocol that hides the identity of the elected aggregator nodes both from external eavesdroppers and from compromised nodes participating in the protocol. We also propose a private data aggregation protocol and a corresponding private query protocol which allows the aggregators to collect sensor readings and respond to queries of the base station, respectively, without revealing any useful information about their identity to external eavesdroppers and to compromised nodes.

Original languageEnglish
Title of host publication2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010
Pages513-518
Number of pages6
DOIs
Publication statusPublished - 2010
Event2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010 - San Francisco, CA, United States
Duration: Nov 8 2010Nov 12 2010

Other

Other2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010
CountryUnited States
CitySan Francisco, CA
Period11/8/1011/12/10

Fingerprint

Wireless sensor networks
Agglomeration
Network protocols
Jamming
Base stations
Scalability
Sensors

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture

Cite this

Buttyán, L., & Holczer, T. (2010). Perfectly anonymous data aggregation in wireless sensor networks. In 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010 (pp. 513-518). [5663911] https://doi.org/10.1109/MASS.2010.5663911

Perfectly anonymous data aggregation in wireless sensor networks. / Buttyán, L.; Holczer, Tamás.

2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010. 2010. p. 513-518 5663911.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Buttyán, L & Holczer, T 2010, Perfectly anonymous data aggregation in wireless sensor networks. in 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010., 5663911, pp. 513-518, 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010, San Francisco, CA, United States, 11/8/10. https://doi.org/10.1109/MASS.2010.5663911
Buttyán L, Holczer T. Perfectly anonymous data aggregation in wireless sensor networks. In 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010. 2010. p. 513-518. 5663911 https://doi.org/10.1109/MASS.2010.5663911
Buttyán, L. ; Holczer, Tamás. / Perfectly anonymous data aggregation in wireless sensor networks. 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010. 2010. pp. 513-518
@inproceedings{d03e79e319a04a7a96f7285e63653619,
title = "Perfectly anonymous data aggregation in wireless sensor networks",
abstract = "Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some security issues; in particular, aggregator nodes become attractive targets of physical destruction and jamming attacks. In order to mitigate this problem, we propose a new private aggregator node election protocol that hides the identity of the elected aggregator nodes both from external eavesdroppers and from compromised nodes participating in the protocol. We also propose a private data aggregation protocol and a corresponding private query protocol which allows the aggregators to collect sensor readings and respond to queries of the base station, respectively, without revealing any useful information about their identity to external eavesdroppers and to compromised nodes.",
author = "L. Butty{\'a}n and Tam{\'a}s Holczer",
year = "2010",
doi = "10.1109/MASS.2010.5663911",
language = "English",
isbn = "9781424474882",
pages = "513--518",
booktitle = "2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010",

}

TY - GEN

T1 - Perfectly anonymous data aggregation in wireless sensor networks

AU - Buttyán, L.

AU - Holczer, Tamás

PY - 2010

Y1 - 2010

N2 - Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some security issues; in particular, aggregator nodes become attractive targets of physical destruction and jamming attacks. In order to mitigate this problem, we propose a new private aggregator node election protocol that hides the identity of the elected aggregator nodes both from external eavesdroppers and from compromised nodes participating in the protocol. We also propose a private data aggregation protocol and a corresponding private query protocol which allows the aggregators to collect sensor readings and respond to queries of the base station, respectively, without revealing any useful information about their identity to external eavesdroppers and to compromised nodes.

AB - Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some security issues; in particular, aggregator nodes become attractive targets of physical destruction and jamming attacks. In order to mitigate this problem, we propose a new private aggregator node election protocol that hides the identity of the elected aggregator nodes both from external eavesdroppers and from compromised nodes participating in the protocol. We also propose a private data aggregation protocol and a corresponding private query protocol which allows the aggregators to collect sensor readings and respond to queries of the base station, respectively, without revealing any useful information about their identity to external eavesdroppers and to compromised nodes.

UR - http://www.scopus.com/inward/record.url?scp=78650997212&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78650997212&partnerID=8YFLogxK

U2 - 10.1109/MASS.2010.5663911

DO - 10.1109/MASS.2010.5663911

M3 - Conference contribution

SN - 9781424474882

SP - 513

EP - 518

BT - 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010

ER -