Abstract

AbstractIn‐network aggregation is considered as an efficient way to reduce the energy consumption in wireless sensor networks (WSNs). However, it opens doors for a compromised node to distort the integrity of the aggregated data by altering the data and disrupting transmission of the aggregation results. Thus, several secure data aggregation protocols were designed to mitigate the effect of the node compromise attack and ensure data integrity. Most protocols can detect the manipulation of the aggregation results and then reject them at the base station, which gives a single node compromise the opportunity to disrupt the limited resources in the network. Reputation‐based secure data aggregation protocols take a step further in helping to identify compromised nodes as early as possible. However, reputation‐based protocols are prone to On‐Off attacks (OOs) in which a compromised node is able to affect the aggregation results without being detected. The compromised node behaves maliciously now and then to ensure that its reputation value is within the trustable level. A solution to defeat this attack is proposed in this paper. The significance of the proposal is twofold: (i) it extends Alzaid et al.'s protocol and mitigates the effect of the OO on the aggregation results, and (ii) it considers non‐homogeneous environments, which requires distinguishing between abrupt and incipient changes. In a comparative analysis of our proposal with Alzaid et al.'s protocol, plain estimate, and reputation‐based estimate shows its superior performance in mitigating the effect of the attack. Copyright © 2011 John Wiley & Sons, Ltd.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.