{"title":"基于交错认证的无线传感器网络弹性网内数据聚合方案","authors":"Wei Li, Qiaoliang Li","doi":"10.1109/WKDD.2009.212","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because WSN often placed in untrust or even hostile environment, so the researches on secure aggregation become meaningful. Most prior works have focus on both data aggregation techniques and security techniques, but the researches on secure data aggregation were still few. In this paper, we focus on the integrality of data aggregation and present a resilient in-network data aggregation scheme for wireless sensor networks deploy in hostile environment.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Resilient In-Network Data Aggregation Scheme for Wireless Sensor Networks Based on Interleaved Authentication\",\"authors\":\"Wei Li, Qiaoliang Li\",\"doi\":\"10.1109/WKDD.2009.212\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because WSN often placed in untrust or even hostile environment, so the researches on secure aggregation become meaningful. Most prior works have focus on both data aggregation techniques and security techniques, but the researches on secure data aggregation were still few. In this paper, we focus on the integrality of data aggregation and present a resilient in-network data aggregation scheme for wireless sensor networks deploy in hostile environment.\",\"PeriodicalId\":143250,\"journal\":{\"name\":\"2009 Second International Workshop on Knowledge Discovery and Data Mining\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Second International Workshop on Knowledge Discovery and Data Mining\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WKDD.2009.212\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Knowledge Discovery and Data Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WKDD.2009.212","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Resilient In-Network Data Aggregation Scheme for Wireless Sensor Networks Based on Interleaved Authentication
Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because WSN often placed in untrust or even hostile environment, so the researches on secure aggregation become meaningful. Most prior works have focus on both data aggregation techniques and security techniques, but the researches on secure data aggregation were still few. In this paper, we focus on the integrality of data aggregation and present a resilient in-network data aggregation scheme for wireless sensor networks deploy in hostile environment.