{"id":"https://openalex.org/W2062462841","doi":"https://doi.org/10.1109/lcn.2012.6423606","title":"Secure sensor network SUM aggregation with detection of malicious nodes","display_name":"Secure sensor network SUM aggregation with detection of malicious nodes","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2062462841","doi":"https://doi.org/10.1109/lcn.2012.6423606","mag":"2062462841"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2012.6423606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078113531","display_name":"Sunoh Choi","orcid":"https://orcid.org/0000-0002-0654-7109"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sunoh Choi","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA","Department of Computer Science, Purdue University, West Lafayette IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069236544","display_name":"Gabriel Ghinita","orcid":"https://orcid.org/0000-0002-8372-3006"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gabriel Ghinita","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts, Boston, MA, USA","[Department of Computer Science, University of Massachusetts Boston, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts, Boston, MA, USA","institution_ids":["https://openalex.org/I33434090"]},{"raw_affiliation_string":"[Department of Computer Science, University of Massachusetts Boston, USA]","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA","Department of Computer Science, Purdue University, West Lafayette IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078113531"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.376,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65271809,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.8201633095741272},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7922015190124512},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.724789023399353},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5168507695198059},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.49705079197883606},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.46110469102859497},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46090424060821533},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.41705214977264404},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41655629873275757},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3762264549732208}],"concepts":[{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.8201633095741272},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922015190124512},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.724789023399353},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5168507695198059},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.49705079197883606},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.46110469102859497},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46090424060821533},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.41705214977264404},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41655629873275757},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3762264549732208},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/lcn.2012.6423606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:docs.lib.purdue.edu:ccpubs-1570","is_oa":false,"landing_page_url":"https://docs.lib.purdue.edu/ccpubs/574","pdf_url":null,"source":{"id":"https://openalex.org/S4377196310","display_name":"Purdue e-Pubs (Purdue University System)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801333002","host_organization_name":"Purdue University System","host_organization_lineage":["https://openalex.org/I2801333002"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cyber Center Publications","raw_type":"text"},{"id":"pmh:oai:docs.lib.purdue.edu:ccpubs-1571","is_oa":false,"landing_page_url":"https://docs.lib.purdue.edu/ccpubs/573","pdf_url":null,"source":{"id":"https://openalex.org/S4377196310","display_name":"Purdue e-Pubs (Purdue University System)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801333002","host_organization_name":"Purdue University System","host_organization_lineage":["https://openalex.org/I2801333002"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cyber Center Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.4300000071525574}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1566046017","https://openalex.org/W1603054560","https://openalex.org/W2026391990","https://openalex.org/W2027423568","https://openalex.org/W2051096402","https://openalex.org/W2073406257","https://openalex.org/W2102832611","https://openalex.org/W2104208424","https://openalex.org/W2110889959","https://openalex.org/W2111609692","https://openalex.org/W2124062450","https://openalex.org/W2126148916","https://openalex.org/W2126310747","https://openalex.org/W2154625773","https://openalex.org/W2158956189","https://openalex.org/W2167396179","https://openalex.org/W3104777467","https://openalex.org/W3140534101","https://openalex.org/W4248301666","https://openalex.org/W6634144252","https://openalex.org/W6657115819"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W1994311829","https://openalex.org/W857034687","https://openalex.org/W2093193679","https://openalex.org/W2149099995","https://openalex.org/W4361214895"],"abstract_inverted_index":{"In-network":[0],"aggregation":[1,25,81,101,136,152,187,235,248],"is":[2,50,111,280],"an":[3,24,161,172,239],"essential":[4],"operation":[5,41],"which":[6,150],"reduces":[7],"communication":[8,212,221],"overhead":[9,213],"and":[10,37,93,201,238,249,274,282],"power":[11],"consumption":[12],"of":[13,72,121,134,149,252,272],"resource-constrained":[14],"sensor":[15],"network":[16],"nodes.":[17],"Sensor":[18],"nodes":[19,29,123,200,226,255,285],"are":[20,177,286],"typically":[21],"organized":[22],"into":[23],"tree,":[26],"whereby":[27],"aggregator":[28,254],"collect":[30],"data":[31,34,90],"from":[32,170,204],"multiple":[33],"source":[35],"nodes,":[36],"perform":[38],"a":[39,61,107,128,182,233],"reduction":[40],"such":[42,141,175],"as":[43,214],"sum,":[44],"average,":[45],"minimum,":[46],"etc.":[47],"The":[48],"result":[49,188,279],"then":[51],"forwarded":[52],"to":[53,89,106,158,179,223],"other":[54,219],"aggregators":[55],"higher":[56],"in":[57,118,189,270],"the":[58,69,73,100,119,132,168,186,198,228,257,277],"hierarchy":[59],"toward":[60],"base":[62,229],"station":[63],"(or":[64],"sink":[65,169],"node)":[66],"that":[67,110,154,160,245,276,283],"receives":[68],"final":[70],"outcome":[71],"in-network":[74],"computation.":[75],"However,":[76,208],"despite":[77],"its":[78],"performance":[79],"benefits,":[80],"introduces":[82],"several":[83,143],"difficult":[84],"security":[85],"challenges":[86],"with":[87,131,227],"respect":[88],"confidentiality,":[91],"integrity":[92],"authenticity.":[94],"In":[95,115],"today's":[96],"outsource-centric":[97],"computing":[98],"environments,":[99],"task":[102],"may":[103,124],"be":[104,125],"delegated":[105],"third":[108],"party":[109],"not":[112],"fully":[113],"trusted.":[114],"addition,":[116],"even":[117],"absence":[120],"outsourcing,":[122],"compromised":[126,183],"by":[127],"malicious":[129,199,253,284],"adversary":[130],"purpose":[133],"altering":[135],"results.":[137],"To":[138],"defend":[139],"against":[140],"threats,":[142],"mechanisms":[144],"have":[145],"been":[146],"proposed,":[147],"most":[148],"devise":[151],"schemes":[153],"rely":[155],"on":[156],"cryptography":[157],"detect":[159],"attack":[162],"has":[163],"occurred.":[164],"Although":[165],"they":[166,215],"prevent":[167],"accepting":[171],"incorrect":[173],"result,":[174],"techniques":[176],"vulnerable":[178],"denial-of-service":[180],"if":[181],"node":[184],"alters":[185],"each":[190],"round.":[191],"Several":[192],"more":[193],"recent":[194],"approaches":[195],"also":[196],"identify":[197],"exclude":[202],"them":[203],"future":[205],"computation":[206],"rounds.":[207],"these":[209],"incur":[210],"high":[211],"require":[216],"flooding":[217],"or":[218],"expensive":[220],"models":[222],"connect":[224],"individual":[225],"station.":[230],"We":[231],"propose":[232],"flexible":[234],"structure":[236,242],"(FAS)":[237],"advanced":[240],"ring":[241],"(ARS)":[243],"topology":[244],"allow":[246],"secure":[247],"efficient":[250],"identification":[251],"for":[256],"SUM":[258],"operation.":[259],"Our":[260],"scheme":[261],"uses":[262],"only":[263],"symmetric":[264],"key":[265],"cryptography,":[266],"outperforms":[267],"existing":[268],"solutions":[269],"terms":[271],"performance,":[273],"guarantees":[275],"aggregate":[278],"correct":[281],"identified.":[287]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
