Trust-based secure aggregation in wireless sensor networks

Junbeom Hur, Yoonho Lee, Seongmin Hong, Hyunsoo Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.

Original languageEnglish
Title of host publication3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
PublisherInternational Institute of Informatics and Systemics, IIIS
Pages1-6
Number of pages6
ISBN (Print)9806560485, 9789806560482
Publication statusPublished - 2005 Jan 1
Externally publishedYes
Event3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005 - Austin, TX, United States
Duration: 2005 Jul 242005 Jul 27

Publication series

Name3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
Volume3

Conference

Conference3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005
CountryUnited States
CityAustin, TX
Period05/7/2405/7/27

Fingerprint

Wireless sensor networks
Agglomeration
Sensors
Sensor nodes
Authentication

Keywords

  • Resilient sensor networks
  • Secure aggregation
  • Security
  • Trust evaluation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Cite this

Hur, J., Lee, Y., Hong, S., & Yoon, H. (2005). Trust-based secure aggregation in wireless sensor networks. In 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings (pp. 1-6). (3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings; Vol. 3). International Institute of Informatics and Systemics, IIIS.

Trust-based secure aggregation in wireless sensor networks. / Hur, Junbeom; Lee, Yoonho; Hong, Seongmin; Yoon, Hyunsoo.

3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings. International Institute of Informatics and Systemics, IIIS, 2005. p. 1-6 (3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings; Vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hur, J, Lee, Y, Hong, S & Yoon, H 2005, Trust-based secure aggregation in wireless sensor networks. in 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings. 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings, vol. 3, International Institute of Informatics and Systemics, IIIS, pp. 1-6, 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Austin, TX, United States, 05/7/24.
Hur J, Lee Y, Hong S, Yoon H. Trust-based secure aggregation in wireless sensor networks. In 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings. International Institute of Informatics and Systemics, IIIS. 2005. p. 1-6. (3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings).
Hur, Junbeom ; Lee, Yoonho ; Hong, Seongmin ; Yoon, Hyunsoo. / Trust-based secure aggregation in wireless sensor networks. 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings. International Institute of Informatics and Systemics, IIIS, 2005. pp. 1-6 (3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings).
@inproceedings{2456d838004f478086785b9e41c73ece,
title = "Trust-based secure aggregation in wireless sensor networks",
abstract = "Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.",
keywords = "Resilient sensor networks, Secure aggregation, Security, Trust evaluation",
author = "Junbeom Hur and Yoonho Lee and Seongmin Hong and Hyunsoo Yoon",
year = "2005",
month = "1",
day = "1",
language = "English",
isbn = "9806560485",
series = "3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings",
publisher = "International Institute of Informatics and Systemics, IIIS",
pages = "1--6",
booktitle = "3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings",

}

TY - GEN

T1 - Trust-based secure aggregation in wireless sensor networks

AU - Hur, Junbeom

AU - Lee, Yoonho

AU - Hong, Seongmin

AU - Yoon, Hyunsoo

PY - 2005/1/1

Y1 - 2005/1/1

N2 - Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.

AB - Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devie are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks be in confusion. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and Alter out malicious nod' deceitful data in the networks. In this paper, to make resilient wireless sensor networks, we propose a secure data aggregation scheme based on trust evaluation model which can Identify trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks indpiently beyond standard authentication mechanisms and conventional key management schemes.

KW - Resilient sensor networks

KW - Secure aggregation

KW - Security

KW - Trust evaluation

UR - http://www.scopus.com/inward/record.url?scp=77956432336&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77956432336&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:77956432336

SN - 9806560485

SN - 9789806560482

T3 - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings

SP - 1

EP - 6

BT - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings

PB - International Institute of Informatics and Systemics, IIIS

ER -