—Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information assurance of the data fusion process is very important. A witness-based approach [9] has been proposed to verify the fusion data. In this approach, the base station receives the fusion data and “votes” on the data from a randomly chosen sensor node. The vote comes from other sensor nodes, called “witnesses,” to confirm the correctness of the fusion data. Since the base station receives the vote through the chosen node, this node could forge the vote if it is compromised. Accordingly, the witness node must apply cryptographic operations to the vote to prevent this forgery. The cryptographic operation requires more bits than the vote, increasi...
Hung-Ta Pai, Yunghsiang S. Han