作者
Thomas Claveirole, Marcelo Dias De Amorim, Michel Abdalla, Yannis Viniotis
发表日期
2008/4/3
期刊
IEEE Communications Magazine
卷号
46
期号
4
页码范围
134-141
出版商
IEEE
简介
A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. We propose three schemes to secure data aggregation that rely on multipath routing. The first guarantees data confidentiality through secret sharing, while the second and third provide data availability through information dispersal. Based on qualitative analysis and implementation, we show that by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.
引用总数
200820092010201120122013201420152016201720182019202020212022242561147264311
学术搜索中的文章
T Claveirole, MD De Amorim, M Abdalla, Y Viniotis - IEEE Communications Magazine, 2008