Efficient Handling of Adversary Attacks in Aggregation Applications

dc.contributor.authorTaban, Gelareh
dc.contributor.authorGligor, Virgil D.
dc.date.accessioned2008-07-08T13:32:33Z
dc.date.available2008-07-08T13:32:33Z
dc.date.issued2008
dc.description.abstractCurrent approaches to handling adversary attacks against data aggregation in sensor networks either aim exclusively at the detection of aggregate data corruption or provide rather inefficient ways to identify the nodes captured by an adversary. In contrast, we propose a distributed algorithm for efficient identification of captured nodes over a constant number of rounds, for an arbitrary number of captured nodes. We formulate our problem as a combinatorial group testing problem and show that this formulation leads not only to efficient identification of captured nodes but also to a precise cost-based characterization of when in-network aggregation retains its assumed benefits in a sensor network operating under persistent attacks.en
dc.description.sponsorshipThis research was supported in part by US Army Research Laboratory and the UK Ministry of Defence under Agreement Number W911NF-06-3-0001 and by the US Army Research Office under Contract W911NF-07-1-0287 at the University of Maryland. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory, US Army Research Office, the U.S. Government, the UK Ministry of Defense, or the UK Government.en
dc.format.extent762385 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.citationProceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008)en
dc.identifier.urihttp://hdl.handle.net/1903/8280
dc.language.isoen_USen
dc.relation.isAvailableAtInstitute for Systems Researchen_us
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_us
dc.relation.isAvailableAtUniversity of Maryland (College Park, MD)en_us
dc.relation.ispartofseriesTR 2008-11en
dc.subjectData Aggregationen
dc.subjectSensor Networken
dc.titleEfficient Handling of Adversary Attacks in Aggregation Applicationsen
dc.typeTechnical Reporten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
tr_2008-11.pdf
Size:
744.52 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.81 KB
Format:
Item-specific license agreed upon to submission
Description: