|Author:||J. Wilke, E. Blaß, M. Zitterbart||links:||DownloadSlidesBibtex|
|Source:||Proceedings of the Fifth International Conference on Networked Sensing Systems (INSS), pp. 254Kanazawa, Japan, June 2008|
This demonstration shows ESAWN-NR in action, a protocol for authentic, yet effcient data aggregation in presence of malicious, compromised sensor nodes. ESAWN-NR does not only achieve authenticity of data aggregates, but also allows to prove forged aggregates coming from specific nodes. This allows easy exclusion of such nodes from the network.