International audienceDue to resource restricted sensor nodes, it is important to minimise the amount of data transmission among sensor networks. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, as sensor networks are often deployed in untrusted and even hostile environments, sensor nodes are prone to node compromise attacks. Hence, an end-to-end secure aggregation approach is required to ensure a healthy data reception. In this paper, we propose two layers for secure data aggregation in sensor networks. Firstly, we provide an end-to-end encryption scheme that supports operations over cypher-text. It is based on elliptic curve cryptography that exploits a smaller ...
The proliferation of sensor networks provides a promising solution for a variety of ubiquitous data ...
In this thesis we consider different aspects of security in sensor networks, in particular query auth...
In many sensor applications, the data collected from individual nodes is aggregated at a base statio...
Summary. Wireless sensor networks are now in widespread use to monitor regions, detect events and ac...
International audienceWireless sensor networks are now in widespread use to monitor regions, detect ...
AbstractThe main objective of this paper is to aggregate the data in a secure way such that the tamp...
Abstract This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks...
[[abstract]]Data aggregation is one of the most important techniques in wireless sensor networks to ...
Abstract: Problem statement: Wireless sensor networks, brings out variety of different challenges at...
Abstract — A wireless sensor network consists of spatially distributed autonomous sensors to monitor...
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor...
Wireless Sensor Networks is made of a large number of low-cost and low power sensor nodes that conta...
Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wi...
International audienceWireless sensor networks (WSNs) are nowadays considered as an important part o...
With the rapid development of wireless communication technology, sensor technology, information acqu...
The proliferation of sensor networks provides a promising solution for a variety of ubiquitous data ...
In this thesis we consider different aspects of security in sensor networks, in particular query auth...
In many sensor applications, the data collected from individual nodes is aggregated at a base statio...
Summary. Wireless sensor networks are now in widespread use to monitor regions, detect events and ac...
International audienceWireless sensor networks are now in widespread use to monitor regions, detect ...
AbstractThe main objective of this paper is to aggregate the data in a secure way such that the tamp...
Abstract This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks...
[[abstract]]Data aggregation is one of the most important techniques in wireless sensor networks to ...
Abstract: Problem statement: Wireless sensor networks, brings out variety of different challenges at...
Abstract — A wireless sensor network consists of spatially distributed autonomous sensors to monitor...
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor...
Wireless Sensor Networks is made of a large number of low-cost and low power sensor nodes that conta...
Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wi...
International audienceWireless sensor networks (WSNs) are nowadays considered as an important part o...
With the rapid development of wireless communication technology, sensor technology, information acqu...
The proliferation of sensor networks provides a promising solution for a variety of ubiquitous data ...
In this thesis we consider different aspects of security in sensor networks, in particular query auth...
In many sensor applications, the data collected from individual nodes is aggregated at a base statio...