Remember Me
Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:

OpenAIRE is about to release its new face with lots of new content and services.
During September, you may notice downtime in services, while some functionalities (e.g. user registration, login, validation, claiming) will be temporarily disabled.
We apologize for the inconvenience, please stay tuned!
For further information please contact helpdesk[at]openaire.eu

fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
De Cristofaro, Emiliano; Bohli, Jens-Matthias; Westhoff, Dirk (2009)
Languages: English
Types: Article,Preprint
Subjects: Computer Science - Cryptography and Security
This work introduces FAIR, a novel framework for Fuzzy-based Aggregation providing In-network Resilience for Wireless Sensor Networks. FAIR addresses the possibility of malicious aggregator nodes manipulating data. It provides data-integrity based on a trust level of the WSN response and it tolerates link or node failures. Compared to available solutions, it offers a general aggregation model and makes the trust level visible to the querier. We classify the proposed approach as complementary to protocols ensuring resilience against sensor leaf nodes providing faulty data. Thanks to our flexible resilient framework and due to the use of Fuzzy Inference Schemes, we achieve promising results within a short design cycle.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. JGraphT: A free Java graph library. http://jgrapht.sourceforge.net/.
    • 2. Mica2Dot. Wireless Microsensor Mote. http://www.xbow.com/products/Product pdf files/Wireless pdf/MICA2DOT Datasheet.pdf.
    • 3. NesC: A Programming Language for Deeply Networked Systems. http://nescc.sourceforge.net/.
    • 4. SensiLink: Middleware to bridge Wireless Sensor Networks with SCADA systems. http://www.meshnetics.com/ wsn-software/sensilink.
    • 5. The AVR Simulation and Analysis Framework. http://compilers.cs.ucla.edu/avrora.
    • 6. The FuzzyJ Toolkit for the Java Platform. http://www.iit.nrc.ca/IRpublic/fuzzy/fuzzyJToolkit2.html.
    • 7. TinyOS: An open source OS for the networked sensor regime. http://www.tinyos.net/.
    • 8. J.-M. Bohli, A. Hessler, O. Ugus, and D. Westho . A Secure and Resilient WSN Roadside Architecture for Intelligent Transport Systems. In WiSec'08, pages 161{171, 2008.
    • 9. M. Breza, R. Anthony, and J. McCann. Quality-of-context driven autonomicity. In EEDAS 2007, 2007.
    • 10. L. Buttyan and P. Scha er. PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks. In MASS'07, pages 1{9, 2007.
    • 11. L. Buttyan, P. Scha er, and I. Vajda. RANBAR: RANSAC-based Resilient Aggregation in Sensor Networks. In SASN'06, pages 83{90, 2006.
    • 12. R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some E cient Constructions. In INFOCOM'99, pages 708{716, 1999.
    • 13. H. Chan, A. Perrig, and D. Song. Secure Hierarchical In-Network Aggregation in Sensor Networks. In CCS'06, pages 278{287, 2006.
    • 14. J.-Y. Chen, G. Pandurangan, and D. Xu. Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis. IEEE Transactions on Parallel and Distributed Systems, 17(9):987{1000, 2006.
    • 15. R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In PERCOM'08, pages 185{194, 2008.
    • 16. W. Du, J. Deng, Y. S. Han, and P. Varshney. A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor Networks. In GLOBECOM'03, volume 3, pages 1435{1439, 2003.
    • 17. D. Dubois and H. Prade. Fuzzy Sets and Systems. 1988.
    • 18. C. Elkan. The paradoxical success of fuzzy logic. IEEE Expert, 9(4):3{8, 1994.
    • 19. P. Flajolet and G. N. Martin. Probabilistic Counting Algorithms for Data Base Applications. Journal of Computer and System Sciences, 31(2):182{209, 1985.
    • 20. M. N. Garofalakis, J. M. Hellerstein, and P. Maniatis. Proof Sketches: Veri able In-Network Aggregation. In ICDE'07, pages 996{1005, 2007.
    • 21. G. Gerla. E ectiveness and multivalued logics. J. Symbolic Logic, 71(1):137{162, 2006.
    • 22. I. Gupta, D. Riordan, and S. Sampalli. Cluster-head election using Fuzzy Logic for Wireless Sensor Networks. pages 255{260, 2005.
    • 23. P. Haghani, P. Papadimitratos, M. Poturalski, K. Aberer, and J.-P. Hubaux. E cient and Robust Secure Aggregation for Sensor Networks. In NPSec'07, 2007.
    • 24. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-E cient Communication Protocol for Wireless Microsensor Networks. In HICSS'00, page 8020, 2000.
    • 25. C. Kai-Yuan. System failure engineering and fuzzy methodology An introductory overview. Fuzzy Sets and Systems, 83(2):113{133, 1996.
    • 26. Y. Kotidis, V. Vassalos, A. Deligiannakis, V. Stoumpos, and A. Delis. Robust management of outliers in sensor network aggregate queries. pages 17{24, 2007.
    • 27. H. Lee and T. Cho. Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. In 4th International Conference on Ubiquitous Intelligence and Computing, volume 4611, pages 535{544, 2007.
    • 28. A. Mahimkar and T. S. Rappaport. SecureDAV: A Secure Data Aggregation and Veri cation Protocol for Sensor Networks. In GLOBECOM'04, volume 4, pages 217{2179, 2004.
    • 29. A. Manjhi, S. Nath, and P. B. Gibbons. Tributaries and deltas: e cient and robust aggregation in sensor network streams. In SIGMOD'05, pages 287{298, 2005.
    • 30. J. E. Mortensen. JFS Fuzzy System. http://inet.uni2.dk/jemor/jfs.htm, 2004.
    • 31. S. Nath, P. B. Gibbons, S. Seshan, and Z. R. Anderson. Synopsis di usion for robust aggregation in sensor networks. In SenSys'04, pages 250{262, 2004.
    • 32. F. Naumann, U. Leser, and J. Freytag. Quality-driven Integration of Heterogeneous Information Systems. In 25th VLDB Conference, 1999.
    • 33. E. Osipov. tinyLUNAR: One-Byte Multihop Communications Through Hybrid Routing in Wireless Sensor Networks. In NEW2AN, pages 379{392, 2007.
    • 34. B. Przydatek, D. Song, and A. Perrig. SIA: Secure Information Aggregation in Sensor Networks. In SenSys'03, pages 255{265, 2003.
    • 35. R. Resende, N. Nassif, M. de Siqueira, A. da Silva, and M. Lima-Marques. Quality of Service Control in IP Networks Using Fuzzy Logic for Policy Condition Evaluation. In FUZZ'05, pages 448{453, 2005.
    • 36. T. Ross. Fuzzy Logic with Engineering Applications. Wiley, 2004.
    • 37. M. Sirivianos, D. Westho , F. Armknecht, and J. Girao. Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks. In WiOpt'07, pages 1{10, 2007.
    • 38. G. Taban and V. Gligor. E cient Handling of Adversary Attacks in Aggregation Applications. In ESORICS'08, LNCS, 2008.
    • 39. D. Wagner. Resilient Aggregation in Sensor Networks. In SASN '04, pages 78{87, 2004.
    • 40. L. Wang. Adaptive Fuzzy Systems and Control: Design and Stability analysis. Prentice-Hall, 1994.
    • 41. L. Wang. A course in Fuzzy Systems and Control. Prentice-Hall, Inc., 1996.
    • 42. Y. Yang, X. Wang, S. Zhu, and G. Cao. SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. In MobiHoc'06, pages 356{367, 2006.
    • 43. L. Zadeh. Fuzzy Sets. Information and Control, 8:338{353, 1965.
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

    Title Year Similarity

    Data Privacy for a $\rho$-Recoverable Function


Share - Bookmark

Funded by projects


Cite this article

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok