Two-Levels Verification For Secure Data Aggregation In Resource-Constrained Environments

2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)(2018)

引用 1|浏览18
暂无评分
摘要
Many resource-constrained applications make use of data aggregation in order to prolong the network lifetime. However, the resource-constrained devices are usually deployed in unattended environments in which providing security is of paramount importance. This leads to various attacks that can occur during data aggregation process. Internal attacks such as selective forwarding represent the most dangerous ones since they cannot be detected by existing cryptography-based protocols proposed to secure data aggregation. In this work, we propose a two-levels verification, in which data is verified using cryptography and intrusion detection techniques. Indeed, a lightweight homomorphic encryption is combined with a game-theory based technique to efficiently secure data aggregation. Our analysis and results show the applicability of the system for aggregation-based resource-constrained applications, especially those considering sensitive information (e.g. health monitoring, military) where the time-efficient detection is crucial.
更多
查看译文
关键词
Homomorphic encryption, IDS, Belief Game, Data aggregation, Internal Attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要