• Corpus ID: 18195794

Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey

@inproceedings{Sorniotti2007SecureAT,
  title={Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey},
  author={Alessandro Sorniotti},
  year={2007}
}
SAP Labs France SAS805, avenue du Dr. Maurice Donat06250 Mougins, FranceEmail:name.surname@sap.comAbstract: In-network data processing in wireless sensor net-works (WSN) is a rapidly emerging research topic. The dis-tributed processing could have several advantages for wirelesssensor networks. First of all, in WSN computation is typicallymuch less energy consuming than communication. Secondly,in-network processing enables WSN to provide more com-plex services to application layer, and not only… 

Figures from this paper

Data Aggregation Security Challenge in Wireless Sensor Networks

TLDR
This paper surveys the current research related to security in data aggregation in wireless sensor networks, and classified the security schemes studied in two main categories: cryptographic based scheme and trust based scheme.

FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks

TLDR
There is a need for investigating the feasibility of a configurable software-based link layer security architecture wherein an application can be compiled flexibly, with respect to its actual security demands, as well as saving the precious resources in the WSNs.

A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project

TLDR
Initial research results on an architecture aiming at supporting and securing the integration of sensor networks into large scale industrial environments are presented in the recently started "TWISNet: Trustworthy Wireless Industrial Sensor Networks" project.

A Low-Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks

TLDR
The results have shown that the proposed scheme is scalable and an strong competitors to pure symmetric key schemes, yet, it maintains all security levels provided by public key schemes.

Secure Data Aggregation in Wireless Sensor Networks

  • Vimal KumarS. Madria
  • Computer Science
    Wireless Sensor Network Technologies for the Information Explosion Era
  • 2010
TLDR
In this chapter, a discussion on general secure data aggregation framework is provided and a few existingsecure data aggregation schemes are surveyed to survey.

Improvement of Directed Diffusion Routing Protocol in Wireless Sensor Network Security

TLDR
A new method is proposed that uses both public key cryptography and symmetric key cryptography in the encryption/decryption process and is most suitable for wireless sensor networks that incorporate data centric routing protocols.

Security Vulnerabilities In Wireless Sensor Networks: A Survey

TLDR
In this article, how WSN differs from wired network and other wireless network and also basic information about the WSN and its security issues compared with wired networkand other wireless networks is discoursed.

Challenges in Secure Sensor-Cloud Computing

TLDR
The vision of this article is to introduce the sensor-cloud computing and overview the research challenges from the security perspective.

Toward Integrated Real-World Sensing Environment - Applications and Challenges

  • S. KrcoK. Wrona
  • Computer Science, Business
    Theoretical Aspects of Distributed Computing in Sensor Networks
  • 2011
TLDR
In this chapter, the potential capacity impact of several selected sensor-based applications on the WCDMA radio access network, both dedicated and common channels, is presented.

A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)

TLDR
This paper presents a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them.

References

SHOWING 1-10 OF 67 REFERENCES

SecureDAV: a secure data aggregation and verification protocol for sensor networks

TLDR
This paper presents a protocol for establishing cluster keys in sensor networks using verifiable secret sharing using elliptic curve cryptosystems and develops a secure data aggregation and verification protocol that ensures that the base station never accepts faulty aggregate readings.

Efficient aggregation of encrypted data in wireless sensor networks

TLDR
This paper proposes a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data and shows that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.

Secure Data Aggregation in Wireless Sensor Networks: A Survey

TLDR
The framework for end-to-end encrypted data aggregation has higher computation cost on the sensor nodes, but achieves stronger security, in comparison with the framework for hop-by-hopencrypted data aggregation.

TinySA: a security architecture for wireless sensor networks

TLDR
The design and rationale of TinySA, a lightweight security architecture for wireless sensor networks and so-called "smart dust" running the TinyOS operating system, are presented, which shows that strong elliptic curve cryptography is feasible on sensor nodes.

On Concealed Data Aggregation for Wireless Sensor Networks

TLDR
This paper describes and evaluates three algorithms that allow the concealed data aggregation (CDA) in wireless sensor networks and evaluates the two biggest issues of the very promising CMT algorithm.

Information-intensive wireless sensor networks: potential and challenges

TLDR
This article motivates information-rich wireless video sensor networks that emulate the compound eyes found in certain arthropods and describes key research problems in the areas of networking, security, sensor design, and video-data analysis.

Reputation-based framework for high integrity sensor networks

TLDR
A Bayesian formulation, specifically a beta reputation system, is employed for the algorithm steps of reputation representation, updates, integration and trust evolution in sensor networks to allow the sensor nodes to develop a community of trust.

Fault-tolerant clustering of wireless sensor networks

  • G. GuptaM. Younis
  • Computer Science
    2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003.
  • 2003
TLDR
This paper proposes an efficient mechanism to recover sensors from a failed cluster that avoids a full-scale re-clustering and does not require deployment of redundant gateways.

Elliptic curve cryptography-based access control in sensor networks

TLDR
Against the popular belief that a public key scheme is not practical for sensor networks, this paper describes a public-key implementation of access control in a sensor network and details the implementation of Elliptic Curve Cryptography over primary field on TelosB, which is the latest sensor network platform.

CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY

TLDR
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.
...