SIA: secure information aggregation in sensor networks

@inproceedings{Chan2003SIASI,
  title={SIA: secure information aggregation in sensor networks},
  author={Haowen Chan and A. Perrig and Bartosz Przydatek and D. Song},
  booktitle={SenSys '03},
  year={2003}
}
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensor nodes often have limited computation and communication resources and battery power. Moreover, in many applications sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the sensor's cryptographic keys.One of the basic and indispensable functionalities of… Expand
997 Citations
SIA: Secure information aggregation in sensor networks
  • 237
  • PDF
Provably Secure Framework for Information Aggregation in Sensor Networks
  • 11
  • Highly Influenced
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
  • 18
  • Highly Influenced
A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks
  • Emiliano De Cristofaro
  • Computer Science
  • 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
  • 2007
  • 1
  • PDF
Secure data aggregation in wireless sensor networks: A comprehensive overview
  • 398
  • Highly Influenced
  • PDF
Secure Data Aggregation in Wireless Sensor Networks
  • 168
  • PDF
SecureDAV: a secure data aggregation and verification protocol for sensor networks
  • 157
  • PDF
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
  • 1
  • PDF
Secure Data Aggregation in Wireless Sensor Networks: Enumeration Attack and Countermeasure
  • A. Aseeri, R. Zhang
  • Computer Science
  • ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
  • 2019
  • 2
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-6 OF 6 REFERENCES
TAG: a Tiny AGgregation service for ad-hoc sensor networks
  • 3,355
  • Highly Influential
  • PDF
An Oblivious Transfer Protocol with Log-Squared Communication
  • 286
  • Highly Influential
  • PDF
Fast approximate PCPs
  • 29
  • Highly Influential
  • PDF
Probabilistic counting
  • P. Flajolet, G. Martin
  • Computer Science
  • 24th Annual Symposium on Foundations of Computer Science (sfcs 1983)
  • 1983
  • 171
  • Highly Influential
Counting Distinct Elements in a Data Stream
  • 469
  • Highly Influential
  • PDF
Secure aggregation for wir eless networks. InWorkshop on Security and Assurance in Ad hoc Networks
  • 2003