Author: | J. Wilke, E. Blaß, M. Zitterbart | links: | DownloadSlidesBibtex |
---|---|---|---|
Source: | Proceedings of the Fifth International Conference on Networked Sensing Systems (INSS), pp. 254Kanazawa, Japan, June 2008 | ||
This demonstration shows ESAWN-NR in action, a protocol
for authentic, yet effcient data aggregation in presence of
malicious, compromised sensor nodes. ESAWN-NR does not
only achieve authenticity of data aggregates, but also allows
to prove forged aggregates coming from specific nodes. This
allows easy exclusion of such nodes from the network.