|
|
1 | (30) |
|
1.1 Wireless Sensor Networks |
|
|
1 | (6) |
|
|
2 | (1) |
|
1.1.2 Enabling Technologies |
|
|
3 | (2) |
|
|
5 | (2) |
|
1.2 Security Issues in Wireless Sensor Networks |
|
|
7 | (19) |
|
1.2.1 Security Requirements and Related Issues |
|
|
8 | (3) |
|
|
11 | (3) |
|
|
14 | (12) |
|
|
26 | (2) |
|
|
28 | (3) |
|
2 Pair-Wise Key Establishment |
|
|
31 | (22) |
|
|
31 | (2) |
|
|
33 | (1) |
|
2.3 Preliminaries and Assumptions |
|
|
34 | (2) |
|
2.3.1 Security Requirements and Threat Model |
|
|
34 | (2) |
|
|
36 | (3) |
|
|
39 | (5) |
|
|
40 | (3) |
|
|
43 | (1) |
|
2.5.3 Probabilistic Authentication |
|
|
43 | (1) |
|
2.6 Simulations and Discussion |
|
|
44 | (8) |
|
|
52 | (1) |
|
|
53 | (22) |
|
|
53 | (2) |
|
3.2 Related Work and Background |
|
|
55 | (3) |
|
3.3 Node Capture Detection Through Mobility and Cooperation |
|
|
58 | (3) |
|
|
58 | (1) |
|
|
59 | (1) |
|
3.3.3 Assumptions and Notation |
|
|
60 | (1) |
|
|
61 | (3) |
|
3.4.1 Protocol Description |
|
|
61 | (3) |
|
3.5 Simulations and Discussion |
|
|
64 | (9) |
|
|
64 | (4) |
|
3.5.2 Experimental Results |
|
|
68 | (3) |
|
|
71 | (1) |
|
3.5.4 Other Mobility Patterns |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
75 | (26) |
|
|
76 | (1) |
|
|
77 | (3) |
|
|
80 | (1) |
|
4.4 Requirements for the Distributed Detection Protocol |
|
|
81 | (2) |
|
4.4.1 Witness Distribution |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (3) |
|
|
86 | (8) |
|
4.6.1 Witness Distribution |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
90 | (4) |
|
4.7 Detection Probability with Malicious Nodes |
|
|
94 | (6) |
|
|
100 | (1) |
|
5 Secure Data Aggregation |
|
|
101 | (24) |
|
|
101 | (3) |
|
|
104 | (3) |
|
5.2.1 Greenwald et al.'s Approximate Median Algorithm |
|
|
105 | (1) |
|
5.2.2 Chan et al.'s Verification Algorithm |
|
|
106 | (1) |
|
5.3 Assumptions and Problem Description |
|
|
107 | (2) |
|
5.4 Computing and Verifying an Approximate Median |
|
|
109 | (5) |
|
|
109 | (1) |
|
5.4.2 A Histogram Verification Algorithm |
|
|
110 | (2) |
|
|
112 | (2) |
|
5.5 Security and Performance Analysis of Our Basic Protocol |
|
|
114 | (3) |
|
|
114 | (1) |
|
5.5.2 Performance Analysis |
|
|
115 | (2) |
|
5.6 Attack-Resilient Median Computation |
|
|
117 | (4) |
|
5.6.1 Geographical Grouping |
|
|
118 | (3) |
|
|
121 | (2) |
|
5.7.1 Simulation Environment |
|
|
121 | (1) |
|
5.7.2 Results and Discussion |
|
|
122 | (1) |
|
|
123 | (2) |
|
6 Privacy in Data Aggregation |
|
|
125 | (30) |
|
|
125 | (2) |
|
|
127 | (1) |
|
6.3 Network Assumptions and Threat Model |
|
|
128 | (1) |
|
|
129 | (2) |
|
|
131 | (5) |
|
6.5.1 Twin-Key Agreement: Protocol Description |
|
|
132 | (4) |
|
|
136 | (5) |
|
6.6.1 Twin-Key Liveness Announcement: Protocol Description |
|
|
136 | (3) |
|
6.6.2 Data Aggregation with Shadow Values: Protocol Description |
|
|
139 | (2) |
|
6.6.3 A Complete Protocol Run |
|
|
141 | (1) |
|
6.7 Security and Complexity Analysis |
|
|
141 | (12) |
|
|
141 | (2) |
|
|
143 | (7) |
|
6.7.3 Complexity Analysis |
|
|
150 | (3) |
|
|
153 | (1) |
|
|
153 | (2) |
|
7 Conclusions and Future Works |
|
|
155 | (2) |
References |
|
157 | |