Loading...
Please wait, while we are loading the content...
Similar Documents
False Data Detection and Secure Data Aggregation in Wireless Sensor Networks
| Content Provider | Scilit |
|---|---|
| Author | Çam, Hasan Ozdemir, Suat |
| Copyright Year | 2007 |
| Description | In wireless sensor networks, sensor nodes are vulnerable to node compromise attacks that threaten their security and efficient utilization of resources. A compromised sensor node can inject false data during data forwarding and aggregation to forge the integrity of sensor data. It is highly desirable for sensor nodes to detect and drop false data as soon as possible in order to avoid depleting their limited resources such as battery power and bandwidth. In addition, the false data detection algorithms should be designed with data aggregation and confidentiality in mind. Data aggregation is used to reduce the redundancy in transmitted data and to improve the data accuracy. This chapter reviews the existing false data detection, data aggregation, secure data aggregation, and key establishment schemes for wireless sensor networks. It also addresses how false data detection can be integrated with data aggregation and confidentiality. Book Name: Security in Distributed, Grid, Mobile, and Pervasive Computing |
| Related Links | https://api.taylorfrancis.com/content/chapters/oa-edit/download?identifierName=doi&identifierValue=10.1201/9780849379253-9&type=chapterpdf |
| Ending Page | 157 |
| Page Count | 29 |
| Starting Page | 129 |
| DOI | 10.1201/9780849379253-9 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2007-04-17 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Security in Distributed, Grid, Mobile, and Pervasive Computing Statistics and Probability Data Detection Data Aggregation Wireless Sensor Networks Sensor Nodes |
| Content Type | Text |
| Resource Type | Chapter |