About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Report

Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks

By Zenner, Erik1,2

From

Discrete mathematics, Department of Mathematics, Technical University of Denmark1

Department of Mathematics, Technical University of Denmark2

In order to save bandwidth and thus battery power, sensor network measurements are sometimes aggregated en-route while being reported back to the querying server. Authentication of the measurements then becomes a challenge if message integrity is important for the application. At ESAS 2007, the End-by-Hop protocol for securing in-network aggregation for sensor nodes was presented.

The solution was claimed to be secure and efficient and to provide the possibility of trading off bandwidth against computation time on the server. In this paper, we disprove these claims. We describe several attacks against the proposed solution and point out shortcomings in the original complexity analysis.

In particular, we show that the proposed solution is inferior to a naive solution without in-network aggregation both in security and in efficiency.

Language: English
Publisher: Technical University of Denmark
Year: 2009
Series: Mat Report
ISSN: 09047611
Types: Report

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis