Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/9475
Title: Locating malicious nodes for data aggregation in wireless networks
Authors: Xu, X
Wang, Q
Cao, J 
Wan, PJ
Ren, K
Chen, Y
Issue Date: 2012
Source: Proceedings - IEEE INFOCOM, 2012, 6195758, p. 3056-3060 How to cite?
Journal: Proceedings - IEEE INFOCOM 
Abstract: Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
Description: IEEE Conference on Computer Communications, INFOCOM 2012, Orlando, FL, 25-30 March 2012
URI: http://hdl.handle.net/10397/9475
ISBN: 9781467307758
ISSN: 0743-166X
DOI: 10.1109/INFCOM.2012.6195758
Appears in Collections:Conference Paper

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

2
Last Week
0
Last month
0
Citations as of Jan 23, 2017

Page view(s)

17
Last Week
0
Last month
Checked on Jan 22, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.