Please use this identifier to cite or link to this item:
Title: Locating malicious nodes for data aggregation in wireless networks
Authors: Xu, X
Wang, Q
Cao, J 
Wan, PJ
Ren, K
Chen, Y
Issue Date: 2012
Source: Proceedings - IEEE INFOCOM, 2012, 6195758, p. 3056-3060 How to cite?
Abstract: Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
Description: IEEE Conference on Computer Communications, INFOCOM 2012, Orlando, FL, 25-30 March 2012
ISBN: 9781467307758
ISSN: 0743-166X
DOI: 10.1109/INFCOM.2012.6195758
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Jan 18, 2019

Page view(s)

Last Week
Last month
Citations as of Jan 14, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.