5th International ICST Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks

Research Article

Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks

  • @INPROCEEDINGS{10.1109/WIOPT.2007.4480031,
        author={Michael Sirivianos and Dirk  Westhof and Frederik Armknecht and Joao Girao},
        title={Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks},
        proceedings={5th International ICST Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={3},
        keywords={Cryptographic protocols  Energy consumption  Energy states  Europe  Microsensors  National electric code  Nominations and elections  Peer to peer computing  Wireless application protocol  Wireless sensor networks},
        doi={10.1109/WIOPT.2007.4480031}
    }
    
  • Michael Sirivianos
    Dirk Westhof
    Frederik Armknecht
    Joao Girao
    Year: 2008
    Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks
    WIOPT
    IEEE
    DOI: 10.1109/WIOPT.2007.4480031
Michael Sirivianos1,*, Dirk Westhof2,*, Frederik Armknecht2,*, Joao Girao2,*
  • 1: University of California, Irvine
  • 2: NEC Europe Lt
*Contact email: msirivia@uci.edu, dirk.westhoff@netlab.nec.de, frederik.armknecht@netlab.nec.de, joao.girao@netlab.nec.de

Abstract

Aggregator nodes commonly have the ability to read, corrupt or disrupt the flow of information produced by a wireless sensor network (WSN). Despite this fact, existing aggregator node election schemes do not address an adversary that strives to influence the election process towards candidate nodes that it controls. We discuss the requirements that need to be fulfilled by a non-manipulable aggregator node election protocol. We conclude that these requirements can be satisfied by a distributed random number generator function in which no node is able to determine the output of the function. We provide and compare three protocols that instantiate such function.