Download now Free registration required
In order to save bandwidth and thus battery power, sensor network measurements are sometimes aggregated en-route while being reported back to the querying server. Authentication of the measurements then becomes a challenge if message integrity is important for the application. At ESAS 2007, the End-by-Hop protocol for securing in-network aggregation for sensor nodes was presented. The solution was claimed to be secure and efficient and to provide the possibility of trading o bandwidth against computation time on the server. In this paper, the authors disprove these claims. They describe several attacks against the proposed solution and point out shortcomings in the original complexity analysis.
- Format: PDF
- Size: 381.1 KB