Locating Malicious Nodes for Data Aggregation in Wireless Networks

Xiaohua Xu,Qian Wang,Jiannong Cao,Peng-Jun Wan,Kui Ren,Yuanfang Chen
DOI: https://doi.org/10.1109/infcom.2012.6195758
2012-01-01
Abstract:Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
What problem does this paper attempt to address?