loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: David Jost and Mathias Fischer

Affiliation: Universität Hamburg, Germany

Keyword(s): Data Aggregation, Distributed Networks, Integrity, Attacker Identification, Sensor Networks.

Abstract: Data integrity in distributed data sensing and processing platforms or middlewares is an important issue, especially if those platforms are open to anyone. To leverage the resources of participating nodes and to enhance the scalability, nodes can be included in the data processing, e.g., in the aggregation of results. In an open system, it is also likely that some participating nodes are malicious and lie about their sensed values or about the results of data processed by them. Current approaches that preserve data integrity for in-network processing require expensive cryptographic operations. With Accountant we propose a new approach, which requires significantly less computation at the expense of slightly more signalling overhead. Furthermore, our approach cannot only preserve data integrity, but also allows to identify malicious nodes. For that, Accountant uses multiple inner node-disjoint trees for data dissemination and hash trees for preserving the data integrity. We compare it to existing solutions, showing that with only minor additional messaging overhead, Accountant can protect the data integrity and can identify attackers at the same time. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.142.195.24

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jost, D. and Fischer, M. (2020). Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing. In Proceedings of the 6th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-399-5; ISSN 2184-4356, SciTePress, pages 561-568. DOI: 10.5220/0008974405610568

@conference{icissp20,
author={David Jost. and Mathias Fischer.},
title={Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing},
booktitle={Proceedings of the 6th International Conference on Information Systems Security and Privacy - ICISSP},
year={2020},
pages={561-568},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008974405610568},
isbn={978-989-758-399-5},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 6th International Conference on Information Systems Security and Privacy - ICISSP
TI - Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing
SN - 978-989-758-399-5
IS - 2184-4356
AU - Jost, D.
AU - Fischer, M.
PY - 2020
SP - 561
EP - 568
DO - 10.5220/0008974405610568
PB - SciTePress