CFP last date
22 April 2024
Reseach Article

Secure Data Aggregation Technique in Wireless Sensor Network: A Survey

by Punam Dandare, Vikrant Chole, Shruti Kolte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 10
Year of Publication: 2015
Authors: Punam Dandare, Vikrant Chole, Shruti Kolte
10.5120/ijca2015907412

Punam Dandare, Vikrant Chole, Shruti Kolte . Secure Data Aggregation Technique in Wireless Sensor Network: A Survey. International Journal of Computer Applications. 131, 10 ( December 2015), 17-20. DOI=10.5120/ijca2015907412

@article{ 10.5120/ijca2015907412,
author = { Punam Dandare, Vikrant Chole, Shruti Kolte },
title = { Secure Data Aggregation Technique in Wireless Sensor Network: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 10 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number10/23485-2015907412/ },
doi = { 10.5120/ijca2015907412 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:26:56.645152+05:30
%A Punam Dandare
%A Vikrant Chole
%A Shruti Kolte
%T Secure Data Aggregation Technique in Wireless Sensor Network: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 10
%P 17-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) consist of sensor nodes. It is a collection of wild number of low cost device constraint sensor nodes that communicates using wireless medium and they are small in size, low battery power and limited processing capability. This restraint of low electricity power of a sensor node and limited energy capability makes the wireless sensor network failure. A data aggregation is very important techniques in wireless sensor networks and it reduces the energy consumption by eliminating redundancy. In WSNs, Sensor nodes are resources constrained in memory, data sensing, and battery power and communication capability. Data communication is the process of communications between nodes that consumes a large portion of the total amount of energy used up for WSNs. One of the solutions to reduce number of bits transmitted during communication is data aggregation. As wireless sensor networks are usually deployed in remote and hostile environments to trajectory sensitive information or data, sensor nodes are affected by attacks. Thus, security is an important issue to be considered in WSNs.

References
  1. S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputationbased framework for high integrity sensor networks,” ACM Trans. Sen. Netw., vol. 4, no. 3, pp. 15:1–15:37, Jun. 2008.
  2. H.-L. Shi, K. M. Hou, H. ying Zhou, and X. Liu, “Energy efficient and fault tolerant multicore wireless sensor network: E2MWSN,” in Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, 2011, pp. 1–4.
  3. X.-Y. Xiao, W.-C.Peng, C.-C.Hung, and W.-C. Lee, “Using SensorRanks for in-network detection of faulty readings in wireless sensor networks,” in Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access, ser. MobiDE ‟07, 2007, pp. 1–8.
  4. He, W., Liu, X., Nguyen, H. V., Nahrstedt, K., and Abdelzaher, T. 2011. “Privacy preserving data aggregation for information collection "ACM Transaction Sensor Network. Article 6 (August 2011.DOI = 10.1145/1993042.199)3048.
  5. H.-S. Lim, Y.-S. Moon, and E. Bertino, “Provenancebased trustworthiness assessment in sensor networks,” in Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, ser. DMSN ‟10, 2010, pp. 2–7.
  6. S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 3, pp. 1040–1052, 2012.
  7. B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks”, in proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 255-265.
  8. L. Hu, D. Evans, “Secure Aggregation for Wireless Networks”, in Symposium on Applications and the Internet Workshops, 27-31 January 2003, pp. 384-391.
  9. H. OzgurSanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks”, in IEEE 60th Conference on Vehicular Technology, VTC2004-Fall, Volume 7, 26-29 September 2004, pp. 4650–4654.
  10. S. Ozdemir, “Secure and Reliable Data Aggregatiob for Wireless Sensor Networks”, in proceedings of 4th International Symposium, UCS 2007, Tokya, Japan, 25-28 November 2007, pp. 102-109.
  11. Chan, H., Perrig, A. & Song, D. (2006), secure hierarchical in-network aggregation in sensor networks,in A. Jules, R. N. Wright & S. D. C. di Vimercati,eds, ‘ACM Conference on Computer and CommunicationsSecurity’, ACM, pp. 278–287.
Index Terms

Computer Science
Information Sciences

Keywords

Data Aggregation Wireless sensor network security