Efficient Handling of Adversary Attacks in Aggregation Applications

  • Gelareh Taban
  • Virgil D. Gligor
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5283)


Current approaches to handling adversary attacks against data aggregation in sensor networks either aim exclusively at the detection of aggregate data corruption or provide rather inefficient ways to identify the nodes captured by an adversary. In contrast, we propose a distributed algorithm for efficient identification of captured nodes over a constant number of rounds, for an arbitrary number of captured nodes. We formulate our problem as a combinatorial group testing problem and show that this formulation leads not only to efficient identification of captured nodes but also to a precise cost-based characterization of when in-network aggregation retains its assumed benefits in a sensor network operating under persistent attacks.


Sensor Network Sensor Node Malicious Node Message Authentication Code Link Cost 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bloom, B.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)CrossRefzbMATHGoogle Scholar
  2. 2.
    Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing 2(3), 233–247 (2005)CrossRefGoogle Scholar
  3. 3.
    Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 278–287 (2006)Google Scholar
  4. 4.
    Du, D.-Z., Hwang, F.K.: Competitive group testing. Discrete Applied Mathematics 45(3), 221–232 (1993)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Du, D.-Z., Hwang, F.K.: Combinatorial Group Testing and Its Applications, 2nd edn. On Applied Mathematics, vol. 12. World Scientific, Singapore (2000)zbMATHGoogle Scholar
  6. 6.
    Fiat, A., Tassa, T.: Dynamic traitor tracing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)Google Scholar
  7. 7.
    Frikken, K., Dougherty IV, J.A.: Efficient integrity-preserving scheme for hierarchical sensor aggregation. In: Proceedings of the 1st ACM conference on Wireless Network Security (2008)Google Scholar
  8. 8.
    Haghani, P., Papadimitratos, P., Poturalski, M., Aberer, K., Hubaux, J.-P.: Efficient and robust secure aggregation for sensor networks. In: 3rd IEEE Workshop on Secure Network Protocols, October 2007, pp. 1–6 (2007)Google Scholar
  9. 9.
    Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Workshop on Security and Assurance in Ad Hoc Networks, pp. 384–392 (2003)Google Scholar
  10. 10.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (2003)Google Scholar
  11. 11.
    Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 122–130 (2002)Google Scholar
  12. 12.
    Taban, G., Gligor, V.D.: Efficient handling of adversary attacks in aggregation applications. Technical Report TR 2008-11, Institute of Systems Research (2008)Google Scholar
  13. 13.
    Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)Google Scholar
  14. 14.
    Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Gelareh Taban
    • 1
  • Virgil D. Gligor
    • 2
  1. 1.ECEUniversity of MarylandUSA
  2. 2.ECE and CyLabCarnegie Mellon UniversityUSA

Personalised recommendations