Share and Disperse: How to Resist Aginst Aggregator Compromises in Sensor Networks

Thomas Claveirole¹ Marcelo Dias de Amorim¹ Michel Abdalla² Yannis Viniotis³
¹LIP6/CNRS ²Département d'Informatique ³Department of ECE
Université Pierre et Marie Curie – Paris VI École Normale Supérieure North Carolina State University
Paris, France Paris, France Raleigh, NC, USA
{claveiro¸amorim} AT rp.lip6.fr michel.abdalla AT ens.fr candice AT ncsu.edu

A common approach to contour the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. In order to secure data aggregation, this paper proposes three schemes that rely on multipath routing. The first one guarantees data confidentiality through secret sharing, while the second and third ones provide data availability through information dispersal. We show from qualitative analysis and implementation that, by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.

Related papers

Download the implementation

Footnotes

[1]
© IEEE, (2008). This is the author's version of the work. It is posted here by permission of the IEEE for your personal use. Not for redistribution.
[2]
© ACM, (2006). This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.