Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we propose an efficient and optimally secure sensor network aggregation protocol against multiple corrupted nodes by a random-walk adversary. Our protocol achieves one round-trip communication to satisfy optimal security without the result-checking phase, by conducting aggregation along with the verification, based on the idea of TESLA technique. Furthermore, we show that the congestion complexity, communication complexity and computational cost in our protocol are constant, i.e., O(1).
- 電子情報通信学会の論文
- 2011-10-01
著者
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol. (jaist)
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol.
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol.
関連論文
- A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics
- Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
- Consideration of Lightweight Chameleon Hash Function (2)
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- Software Obfuscation on a Theoretical Basis and Its Implementation
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- Sequential Bitwise Sanitizable Signature Schemes
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- New Concrete Relation between Trace, Definition Field, and Embedding Degree
- Efficinet Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
- Methods for Restricting Message Space in Public-Key Encryption
- Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing
- Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing
- The Security of RC6 against Asymmetric Chi-square Test Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- Secure Dynamic Hourglass Protocol for Untrusted Server