64
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

False Data Elimination in Heterogeneous Wireless Sensor Networks Using Location-Based Selection of Aggregator Nodes

, &

References

  • S. Sivathasan, and D. O’Brien, “Hybrid radio and optical communications for energy-efficient wireless sensor networks,” IETE J. Res., Vol. 57, pp. 399–406, Sept. 2011.
  • F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route detection and filtering of injected false data in sensor networks,” Proc. IEEE INFOCOM, Vol. 4, pp. 2446–57, Mar. 2004.
  • S. Zhu, S. Setia, S. Jajodia, and P. Ning, “Interleaved hop-by-hop authentication against false data injection attacks in sensor networks,” ACM Trans. Sensor Netw., Vol. 3, Aug. 2007.
  • H. Yang, and S. Lu, “Commutative cipher based en-route filtering in wireless sensor networks,” Proc. IEEE VTC, Vol. 2, pp. 1223–7, Sept. 2004.
  • Z. Yu, and Y. Guan, “A dynamic en-route scheme for filtering false data in wireless sensor networks,” in Proceedings of IEEE INFOCOM, Barcelona, Spain, 2006, pp. 1–12.
  • B. Przydatek, D. Song, and A. Perrig, “SIA: Secure information aggregation in sensor networks,” in Proceedings of SenSys’03, Los Angeles, CA, 2003, pp. 255–65.
  • W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A witness-based approach for data fusion assurance in wireless sensor networks,” in Proceedings of GLOBECOM’03, San Francisco, CA, 2003, pp. 1435–9.
  • K. Wu, D. Dreef, B. Sun, and Y. Xiao, “Secure data aggregation without persistent cryptographic operations in wireless sensor networks,” Ad Hoc Netw., Vol. 5, pp. 100–11, Jan. 2007.
  • Y. Yang, X. Wang, S. Zhu, and G. Cao, “SDAP: A secure hop-by-hop data aggregation protocol for sensor networks,” in Proceedings of ACM MOBIHOC’06, Florence, Italy, May 2006, pp. 356–67.
  • S. Ozdemir, and H. Cam, “Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks,” IEEE/ACM Trans. Netw., Vol. 18, pp. 736–9, Jun. 2010.
  • W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the Hawaii International Conference on System Sciences (HICSS), Hawaii, Jan 2000, pp. 1–10.
  • M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao. “Non-manipulable aggregator node election protocols for wireless sensor networks,” in Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Limassol, April 2007, pp. 1–10.
  • L. Buttyan, and P. Schaffer, “PANEL: Position-based aggregator node election in wireless sensor networks,” in IEEE Proceedings, Pisa, Oct. 2007, pp. 1–9.
  • J. Zhang, and V. Varadharajan, “Wireless sensor network key management survey and taxonomy,” J. Netw. Comput. Appl., Vol. 33, pp. 63–75, 2010.
  • L. Yu, N. Wang, W. Zhang, and C. Zheng, “Deploying a heterogeneous wireless sensor network,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, Sept. 2007, pp. 2588–91.
  • T. Kohda, and T. Fujisaki, “Jacobian elliptic Chebyshev rational maps,” Phys. D, Vol. 148, pp. 242–54, Jan. 2001.
  • NS‑2 – The Network Simulator version 2.32. [Online]. Available: http://www.isi.edu/nsnam/ns./, accessed on 12 September 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.