Sciweavers

INFOCOM
2012
IEEE

Locating malicious nodes for data aggregation in wireless networks

12 years 1 months ago
Locating malicious nodes for data aggregation in wireless networks
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan,
Added 28 Sep 2012
Updated 28 Sep 2012
Type Journal
Year 2012
Where INFOCOM
Authors XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan, Kui Ren, Yuanfang Chen
Comments (0)