Resilient aggregation with attack detection in sensor networks

Levente Buttyán, Péter Schaffer, István Vajda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to detect unexpected deviations before the aggregation function is called. In this model, the adversary does not only want to cause maximal distortion in the output of the aggregation function, but it also wants to remain undetected. The advantage of this approach is that in order to remain undetected, the adversary cannot distort the output arbitrarily, but rather the distortion is usually upper bounded, even for aggregation functions that were considered to be insecure earlier (e.g., the average). We illustrate this through an example in this paper.

Original languageEnglish
Title of host publicationProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Pages332-336
Number of pages5
DOIs
Publication statusPublished - Oct 31 2006
Event4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006 - Pisa, Italy
Duration: Mar 13 2006Mar 17 2006

Publication series

NameProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Volume2006

Other

Other4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
CountryItaly
CityPisa
Period3/13/063/17/06

    Fingerprint

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Buttyán, L., Schaffer, P., & Vajda, I. (2006). Resilient aggregation with attack detection in sensor networks. In Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006 (pp. 332-336). [1598998] (Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006; Vol. 2006). https://doi.org/10.1109/PERCOMW.2006.119