{"title":"Local data protection for in-network processing in sensor networks","authors":"Yi Ouyang, Zhengyi Le, J. Ford, F. Makedon","doi":"10.1109/PERSER.2005.1506392","DOIUrl":null,"url":null,"abstract":"Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network lifetimes, and diminish computational demands. However, securely querying past data becomes a challenge. An unimportant event in the past could become interesting later; therefore, methods for securely placing a query on a past event should be available. This paper focuses on the challenges associated with securing queries on past data in a sensor network, and proposes methods for past data aggregation using in-network processing. Two different methods are proposed for securing queries on past data; both use forward secure cryptography and provide forward secure data authentication. We compare their security and performance, and also compare them with previous schemes.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERSER.2005.1506392","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network lifetimes, and diminish computational demands. However, securely querying past data becomes a challenge. An unimportant event in the past could become interesting later; therefore, methods for securely placing a query on a past event should be available. This paper focuses on the challenges associated with securing queries on past data in a sensor network, and proposes methods for past data aggregation using in-network processing. Two different methods are proposed for securing queries on past data; both use forward secure cryptography and provide forward secure data authentication. We compare their security and performance, and also compare them with previous schemes.