Download Resilient Data Aggregation In Wireless Sensor Networks - eBooks (PDF)

Resilient Data Aggregation In Wireless Sensor Networks


Resilient Data Aggregation In Wireless Sensor Networks
DOWNLOAD

Download Resilient Data Aggregation In Wireless Sensor Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Resilient Data Aggregation In Wireless Sensor Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page



Resilient Data Aggregation In Wireless Sensor Networks


Resilient Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author :
language : en
Publisher:
Release Date : 2004

Resilient Data Aggregation In Wireless Sensor Networks written by and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2004 with categories.


Sensor nodes are low-cost and low-power devices that are prone to node compromises, communication failures and malfunctioning of sensing hardware. As a result, some nodes may report outlying data values, introducing significant deviations in the aggregated sensor readings. This thesis presents a practical resilient outlier detection technique to filter out the influence of the outlying data reported by faulty or compromised nodes. The proposed outlier detection algorithm is based on event localization using minimum mean squared error (MMSE) estimation combined with threshold-based consistency checking to detect outliers. Data aggregation is one of the key techniques commonly used to develop lightweight communication protocols applicable to wireless sensor networks. The proposed approach handles localization of multiple events by grouping the sensor readings into spatially correlated clusters and performing an event-centric detection of outliers. In the entire process of data aggregation, the outlier detection technique fits as a preprocessing stage for reducing the effect of outliers on the aggregated result. Suitable extensions to the basic outlier detection algorithm are proposed to effectively apply the algorithm to both centralized and decentralized sensor network architectures. This thesis further includes studies that test the effectiveness of the proposed approach, including the detection rate, the false positive rate, degree of damage and the resilience to malicious readings introduced by the attackers. The experimental results show that on average the proposed approach detects as high as 80-90% of the outliers while resulting in 5-15% false positive rate when the network consists of 40-45% outliers. The experiments also show that the extent of damage on the aggregated result is below 50% due to the elimination of outliers before aggregation. Finally, the resilient data aggregation process requires modest computational and memory requirements with zero commu.



Resilient Data Aggregation In Wireless Sensor Networks


Resilient Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Srinath Anantharaju
language : en
Publisher:
Release Date : 2005

Resilient Data Aggregation In Wireless Sensor Networks written by Srinath Anantharaju and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2005 with categories.


Keywords: MMSE, Multiple Events, Event Detection Model, Distributed Outlier Detection, Spatial correlation, Event-centric Outlier Detection, Event Localization.



Mechatronics And Intelligent Materials Ii


Mechatronics And Intelligent Materials Ii
DOWNLOAD
Author : Ran Chen
language : en
Publisher: Trans Tech Publications Ltd
Release Date : 2012-03-15

Mechatronics And Intelligent Materials Ii written by Ran Chen and has been published by Trans Tech Publications Ltd this book supported file pdf, txt, epub, kindle and other format this book has been release on 2012-03-15 with Technology & Engineering categories.


Selected, peer reviewed papers from the 2012 International conference on Mechatronics and Intelligent Materials (MIM 2012), May 18-19, 2012, GuiLin, China



Journal Of Scientific And Industrial Research


Journal Of Scientific And Industrial Research
DOWNLOAD
Author :
language : en
Publisher:
Release Date : 2015

Journal Of Scientific And Industrial Research written by and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015 with Industries categories.




Mswim 07


Mswim 07
DOWNLOAD
Author : Carla-Fabiani Chiasserini
language : en
Publisher:
Release Date : 2007

Mswim 07 written by Carla-Fabiani Chiasserini and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2007 with Computer science categories.




Efficient Data Retrieval In Wireless Sensor Networks


Efficient Data Retrieval In Wireless Sensor Networks
DOWNLOAD
Author : Yong Yao
language : en
Publisher:
Release Date : 2007

Efficient Data Retrieval In Wireless Sensor Networks written by Yong Yao and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2007 with categories.




Wireless Sensor Networks


Wireless Sensor Networks
DOWNLOAD
Author : Sinem Coleri Ergen
language : en
Publisher:
Release Date : 2005

Wireless Sensor Networks written by Sinem Coleri Ergen and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2005 with categories.






DOWNLOAD
Author :
language : zh-CN
Publisher:
Release Date : 2008

written by and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Computers categories.




Secure Data Aggregation In Wireless Sensor Networks


Secure Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Sankardas Roy
language : en
Publisher:
Release Date : 2008

Secure Data Aggregation In Wireless Sensor Networks written by Sankardas Roy and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Computer security categories.


Wireless sensor networks have proved to be useful in several applications, such as environment monitoring and perimeter surveillance. In a large sensor network, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multi-path routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false sub-aggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. In this dissertation, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false sub-aggregate values. In particular, we present two classes of algorithms to securely compute Count or Sum. First, we propose a lightweight verification algorithm which enables the base station to determine if the computed aggregate includes any false contribution. Second, we present attack-resilient computation algorithms which can be used to compute the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy. Thorough theoretical analysis and extensive simulation study show that our algorithms outperform other existing approaches. This dissertation also addresses the security issues of in-network computation of Median and presents verification algorithms and attack-resilient computation algorithms to securely compute an approximate estimate of this aggregate. To the best of our knowledge, prior to this dissertation there was no other work related to the security of in-network computation of Median. We evaluate the performance and cost of our algorithms via both analysis and simulation. The results show that our approach is scalable and efficient.



Acm Conference On Computer And Communications Security


Acm Conference On Computer And Communications Security
DOWNLOAD
Author :
language : en
Publisher:
Release Date : 2006

Acm Conference On Computer And Communications Security written by and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2006 with Computer security categories.