CFP last date
20 May 2024
Reseach Article

A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks

by Josna Jose, Joyce Jose, Fijo Jose
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 18
Year of Publication: 2012
Authors: Josna Jose, Joyce Jose, Fijo Jose
10.5120/8991-2939

Josna Jose, Joyce Jose, Fijo Jose . A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks. International Journal of Computer Applications. 55, 18 ( October 2012), 17-21. DOI=10.5120/8991-2939

@article{ 10.5120/8991-2939,
author = { Josna Jose, Joyce Jose, Fijo Jose },
title = { A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 18 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number18/8991-2939/ },
doi = { 10.5120/8991-2939 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:57:36.034331+05:30
%A Josna Jose
%A Joyce Jose
%A Fijo Jose
%T A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 18
%P 17-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is a collection of large number of low cost resource constraint sensor nodes that are communicating using wireless medium. Sensor nodes are resource constrained in memory, sensing, communication capability, computational capability, battery power. Communication requires more power in sensor networks. One of the solutions to reduce number of bits transmitted is data aggregation. Data Aggregation is a process of aggregating data coming from different source using aggregation function to reduce redundancy in the Transmitted data. The aggregated results have great impact in accuracy and robustness of the final result get from the base station. Security is an important criterion to be considered because, wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. So data aggregation and security are essential for WSN. Many secure aggregations are proposed in wireless sensor network. But due to resource constrained nature, secure data aggregation also need new approaches. In this survey we are going to compare existing secure data aggregation protocol and their limitations and advantages.

References
  1. Y. Sang and H. Shen, Secure Data Aggregation in Wireless Sensor Networks:ASurvey.
  2. Dr. G. Padmavathi, Mrs. D. Shanmugapriya, 2009, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International Journal of Computer Science and Information Security.
  3. H. Cam, S. Ozdemir, P. Nair, and D. Muthuavinashiappan, ESPDA: energy-efficient and secure pattern-based data aggregation for wireless sensor networks, IEEE Sensors–The Second IEEE Conference on Sensors, Oct. 22-24, 2003, Toronto, Canada.
  4. H. Sanli, S. Ozdemir, and H. Cam, SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks, Proc. IEEE 60th Int'l Conf. Vehicular Technology (VTC 04-Fall), vol. 7, pp. 4650-4654, Sept. 2004.
  5. Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAP: A Secure Hop-by- Hop Data Aggregation Protocol for Sensor Networks, ACM Trans. Information and System Security (TISSEC), vol. 11, no. 4, pp. 1-43, 2008.
  6. D. Westhoff, J. Girao, and M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption, Key Distribution, and Routing Adaptation, IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
  7. C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems, pp. 109-117, July 2005.
  8. S. Ozdemir, Concealed Data Aggregation in Heterogeneous Sensor Networks Using Privacy Homomorphism, Proc. IEEE Int'l Conf. Pervasive Services, pp. 165-168, July 2007.
  9. S. Ozdemir and Y. Xiao, Hierarchical Concealed Data Aggregation for Wireless Sensor Networks.
  10. W. Zhang, Y. Liu, S. K. Das, P. De, Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach, Elsevier Pervasive Mobile Comput. 4 (2008) 658–680.
  11. J. Girao, D. Westhoff, and M. Schneider. CDA: Concealed Data Aggregation in Wireless Sensor Networks. In Proc. 40th International Conference on Communiacations, IEEE ICC '05, Korea, May 2005.
  12. Y. E. Aslan and E. Kayaaslan, Security in wireless sensor network, JOURNAL OF CS514 CLASS FILES, VOL. 1, NO. 1, JANUVARY 2008.
  13. A. Pandey and R. C Tripathi, A Survey on Wireless Sensor Networks Security, International Journal of Computer Applicationsc (0975-8887), Volume 3-No. 2, June 2010.
  14. S. Peter and K. Piotrowski, On Concealed Data Aggregation for Wireless Sensor Networks.
  15. C-M Chen,Y-H Lin, Y-C Lin and H-M Sun, RCDA:Recoverable Concealed data aggregation for Data Integtrity in Wireless Sensor Networks, IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMs,VOL. 23,NO. 4,APRIL 2012.
  16. S. Ozdemir and Y. Xiao, Secure data aggregation in wireless sensor networks: A Comprehensive overview, Computer Networks 53 , 2022-2037,2009.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Data Aggregation Secure data aggregation