0% found this document useful (0 votes)
17 views

Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks

This document proposes a protocol called DADA to integrate false data detection with data aggregation and confidential transmission in wireless sensor networks. DADA allows monitoring nodes to conduct data aggregation and compute message authentication codes to support both data aggregation and false data detection. Performance analysis shows DADA can detect any false data injected by up to t compromised nodes, and prevents detected false data from being forwarded beyond the next data aggregator. While false data detection and data confidentiality increase overhead, simulations show DADA can still reduce transmitted data through early false data detection and aggregation.

Uploaded by

krishna
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks

This document proposes a protocol called DADA to integrate false data detection with data aggregation and confidential transmission in wireless sensor networks. DADA allows monitoring nodes to conduct data aggregation and compute message authentication codes to support both data aggregation and false data detection. Performance analysis shows DADA can detect any false data injected by up to t compromised nodes, and prevents detected false data from being forwarded beyond the next data aggregator. While false data detection and data confidentiality increase overhead, simulations show DADA can still reduce transmitted data through early false data detection and aggregation.

Uploaded by

krishna
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Integration of False Data Detection with Data Aggregation and Condential Transmission in Wireless Sensor Networks

ABSTRACT

A WSN is a highly distributed network of small wireless nodes deployed in large numbers of monitor the environment or other systems by the measurement of physical parameters such as temperature, pressure, or relative humidity. Sensor nodes collaborate to form an adhoc network capable of reporting network activities to a data collection sink. Recently, WSNs have been used in many promising applications including habitat monitoring ( ainwaring et al., !""!# and target tracking ($e et al., !""%#. &n wireless sensor networks, compromised sensor nodes can in'ect false data during both data aggregation and data forwarding. (he e)isting false data detection techni*ues consider false data in'ections during data forwarding only and do not allow any change on the data by data aggregation. $owever, this work presents a data aggregation and authentication protocol, called +AA, to integrate false data detection with data aggregation and con,dentiality. (o support data aggregation along with false data detection, the monitoring nodes of every data aggregator also conduct data aggregation and compute the corresponding small-si.e message authentication codes for data veri,cation at their pair mates. /erformance analysis shows that +AA detects any false data in'ected by up to compromised nodes, and that the detected false data are not forwarded beyond the ne)t data aggregator on the path. +espite that false data detection and data con,dentiality increase the communication overhead, simulation results show that +AA can still reduce the amount of transmitted data with the help of data aggregation and early detection of false data. (he suggested approach can be implemented using A(0A1 tool.

You might also like