@ARTICLE{Wang_Yubo_Secure_2019, author={Wang, Yubo and Li, Liang and Ao, Chen and Zhang, Puning and Wang, Zheng and Zhao, Xinyang}, volume={vol. 65}, number={No 2}, journal={International Journal of Electronics and Telecommunications}, pages={259-266}, howpublished={online}, year={2019}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={The data aggregation process of wireless sensor networks faces serious security problems. In order to defend the internal attacks launched by captured nodes and ensure the reliability of data aggregation, a secure data aggregation mechanism based on constrained supervision is proposed for wireless sensor network, which uses the advanced LEACH clustering method to select cluster heads. Then the cluster heads supervise the behaviors of cluster members and evaluate the trust values of nodes according to the communication behavior, data quality and residual energy. Then the node with the highest trust value is selected as the supervisor node to audit the cluster head and reject nodes with low trust values. Results show that the proposed mechanism can effectively identify the unreliable nodes, guarantee the system security and prolong the network lifetime.}, type={Artykuły / Articles}, title={Secure Data Aggregation Mechanism based on Constrained Supervision for Wireless Sensor Network}, URL={http://ochroma.man.poznan.pl/Content/110222/PDF/35.pdf}, doi={10.24425/ijet.2019.126309}, keywords={wireless sensor networks, Security data aggregation, Trust management, Constrained supervision}, }