Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks
Ozdemir S., Çam H. IEEE/ACM Transactions on Networking18 (3):736-749,2010.Type:Article
Date Reviewed: Jul 20 2011

Wireless sensor networks (WSNs) are an important topic these days. Their use is related to a wide variety of applications, from sensor nodes placed at strategic locations to detect environmental information, to composing a mobile wireless mesh network. The latter situation happens when unmanned aerial vehicles (UAVs) are provided with a wireless mesh node, for example.

This paper presents an important study that focuses on the injection of false data that can be transferred from one node to another, improving the overhead in the network but providing incorrect results. This paper treats the problem.

The test and results that this paper explores maintain the integrity of the data, even when the authors use data aggregation, since more than one sensor can receive data and aggregate it.

The authors provide some background, and present assumptions and limitations to help readers understand the vulnerabilities and problems associated with this kind of technology. They address the most frequent attacks and problems, and propose a new protocol for providing greater security and detecting false data. They include all of the details of this protocol, as well as the algorithm for implementing the false data detection. Based on the performance evaluation, this protocol appears to be a good option, and is probably the first one to avoid false aggregation data with integrity.

The target audience for this paper consists of readers who understand the limitations, vulnerabilities, and uses of WSNs. This well-written paper is complete in its references, as well as in its presentation of the protocol, the algorithm, the security analyses, and all of the performance evaluations.

Reviewer:  Kalinka Castelo Branco Review #: CR139260 (1112-1279)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Network Management (C.2.3 ... )
 
 
Performance Attributes (C.4 ... )
 
 
Wireless Communication (C.2.1 ... )
 
 
Network Architecture And Design (C.2.1 )
 
 
Network Operations (C.2.3 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy