{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:40:36Z","timestamp":1763458836403,"version":"3.45.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-0524156NSF-0627382CAREER NSF-0643906"],"award-info":[{"award-number":["NSF-0524156NSF-0627382CAREER NSF-0643906"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-05-1-0270W911NF-07-1-0318"],"award-info":[{"award-number":["W911NF-05-1-0270W911NF-07-1-0318"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,7]]},"abstract":"<jats:p>Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a sensor network. However, because individual sensor readings are lost in the per-hop aggregation process, compromised nodes in the network may forge false values as the aggregation results of other nodes, tricking the base station into accepting spurious aggregation results. Here a fundamental challenge is how can the base station obtain a good approximation of the fusion result when a fraction of sensor nodes are compromised?<\/jats:p>\n                  <jats:p>\n                    To answer this challenge, we propose SDAP, a Secure Hop-by-hop Data Aggregation Protocol for sensor networks. SDAP is a general-purpose secure data aggregation protocol applicable to multiple aggregation functions. The design of SDAP is based on the principles of\n                    <jats:italic toggle=\"yes\">divide-and-conquer<\/jats:italic>\n                    and\n                    <jats:italic toggle=\"yes\">commit-and-attest<\/jats:italic>\n                    . First, SDAP uses a novel probabilistic grouping technique to dynamically partition the nodes in a tree topology into multiple logical groups (subtrees) of similar sizes. A commitment-based hop-by-hop aggregation is performed in each group to generate a group aggregate. The base station then identifies the suspicious groups based on the set of group aggregates. Finally, each group under suspect participates in an attestation process to prove the correctness of its group aggregate. The aggregate by the base station is calculated over all the group aggregates that are either normal or have passed the attestation procedure. Extensive analysis and simulations show that SDAP can achieve the level of efficiency close to an ordinary hop-by-hop aggregation protocol while providing high assurance on the trustworthiness of the aggregation result. Last, prototype implementation on top of TinyOS shows that our scheme is practical on current generation sensor nodes such as Mica2 motes.\n                  <\/jats:p>","DOI":"10.1145\/1380564.1380568","type":"journal-article","created":{"date-parts":[[2008,8,5]],"date-time":"2008-08-05T09:35:10Z","timestamp":1217928910000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["SDAP"],"prefix":"10.1145","volume":"11","author":[{"given":"Yi","family":"Yang","sequence":"first","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Xinran","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]}],"member":"320","published-online":{"date-parts":[[2008,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Castelluccia C. Mykletun E. and Tsudik G. 2005. Efficient aggregation of encrypted data in wireless sensor networks. In Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05). 10.1109\/MOBIQUITOUS.2005.25","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370616.1370623"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147741"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"volume-title":"Proceedings of the Global Telecommunications Conference (GLOBECOM'03)","author":"Du W.","key":"e_1_2_1_8_1","unstructured":"Du, W., Deng, J., Han, Y. S., and Varshney, P. K. 2003b. A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of the Global Telecommunications Conference (GLOBECOM'03)."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313556"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1969.10490657"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'07)","author":"He W.","key":"e_1_2_1_12_1","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'07)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"volume-title":"Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks (SASN'03)","author":"Hu L.","key":"e_1_2_1_14_1","unstructured":"Hu, L. and Evans, D. 2003. Secure aggregation for wireless networks. In Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks (SASN'03)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851836"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"volume-title":"Proceedings of the International Workshop on Distributed Event-Based Systems, (DEBS'02)","author":"Krishnamachari B.","key":"e_1_2_1_18_1","unstructured":"Krishnamachari, B., Estrin, D., and Wicker, S. 2002. The impact of data aggregation in wireless sensor networks. In Proceedings of the International Workshop on Distributed Event-Based Systems, (DEBS'02). Vienna, Austria."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060303"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.7"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705190"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031525"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_7"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180355"},{"key":"e_1_2_1_28_1","unstructured":"TinyKeyMan. http:\/\/discovery.csc.ncsu.edu\/."},{"key":"e_1_2_1_29_1","unstructured":"TinyOS. http:\/\/www.tinyos.net\/."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029116"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/601858.601861"},{"volume-title":"Proceedings of the Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM'04)","author":"Ye F.","key":"e_1_2_1_32_1","unstructured":"Ye, F., Luo, H., Lu, S., and Zhang, L. 2004. Statistical en-route filtering of injected false data in sensor networks. In Proceedings of the Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM'04)."},{"volume-title":"Proceedings of the Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM'05)","author":"Zhang W.","key":"e_1_2_1_33_1","unstructured":"Zhang, W. and Cao, G. 2005. Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In Proceedings of the Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM'05)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062737"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"},{"volume-title":"Proceedings of IEEE Symposium on Security and Privacy (SP'04)","author":"Zhu S.","key":"e_1_2_1_36_1","unstructured":"Zhu, S., Setia, S., Jajodia, S., and Ning, P. 2004. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (SP'04). 259--271."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1380564.1380568","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1380564.1380568","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1380564.1380568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:36:29Z","timestamp":1763458589000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1380564.1380568"}},"subtitle":["A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks"],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["10.1145\/1380564.1380568"],"URL":"https:\/\/doi.org\/10.1145\/1380564.1380568","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2008,7]]},"assertion":[{"value":"2006-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-02-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}