|Autor:||J. Wilke, E. Blaß, M. Zitterbart||Links:||DownloadVortragsfolienBibtex|
|Quelle:||Proceedings of the Fifth International Conference on Networked Sensing Systems (INSS), pp. 254Kanazawa, Japan, Juni 2008|
This demonstration shows ESAWN-NR in action, a protocol for authentic, yet effcient data aggregation in presence of malicious, compromised sensor nodes. ESAWN-NR does not only achieve authenticity of data aggregates, but also allows to prove forged aggregates coming from specific nodes. This allows easy exclusion of such nodes from the network.