Aggregation Query under Presence of Faulty or Malicious Nodes

نویسندگان

  • Yozo Hida
  • Paul Huang
  • Rajesh Nishtala
  • Baruch Awerbuch
  • David Holmer
  • Cristina Nita-Rotaru
  • Markus M. Breunig
  • Hans-Peter Kriegel
  • Raymond T. Ng
  • Deepak Ganesan
  • Ramesh Govindan
  • Scott Shenker
  • John S. Heidemann
  • Fabio Silva
  • Chalermek Intanagonwiwat
  • Deborah Estrin
چکیده

Proposes a secure routing protocol tolerant of faulty or malicious nodes. They consider malicious nodes that tries to create routing loops, misdirects packets, or selectively drops packets. Their algorithm detects malicious links after log n faults where n is the length of the path. Since the protocol relies on packet acks to determine whether the node has reached the destination, the applicability to low-energy sensor network may be limited.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GGRA: a grouped gossip-based reputation aggregation algorithm

An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...

متن کامل

Aggregation Query Under Uncertainty in Sensor Networks

In sensor networks, aggregation is often used to obtain some form of summary of the sensor values, such as the maximum and the average. When there are hundreds of nodes, it is inevitable that some of these sensor will malfunction and report faulty sensor values or fail to route the value information, adversely affecting the aggregate result. In this paper, we describe a simple method to locally...

متن کامل

A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the si...

متن کامل

Neighbor-Based Malicious Node Detection in Wireless Sensor Networks

The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor ne...

متن کامل

Reputation-based Resilient Data Aggregation in Sensor Network

Perez, Carlos R. M.S.E.C.E., Purdue University, December, 2007. Reputation-based Resilient Data Aggregation in Sensor Network . Major Professor: Saurabh Bagchi. Data aggregation, or the fusing of many sensor measurements into a single summary, has been proposed as an important primitive in wireless sensor networks. But data aggregation is vulnerable to security attacks and natural failures wher...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003