Data aggregation techniques in WSN:Survey

被引:75
|
作者
Dhand, Geetika [1 ]
Tyagi, S. S. [2 ]
机构
[1] Manav Rachna Int Univ, Faridabad, Haryana, India
[2] Manav Rachna Int Univ, CSE, Faridabad, Haryana, India
关键词
WSN; Data Gathering; Data aggregation; Clustered based protocols; Single Hop; Multi Hop; DIVISION MULTIPLE-ACCESS; ENERGY REPLENISHMENT; EFFICIENT;
D O I
10.1016/j.procs.2016.07.393
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Different data aggregation techniques require varying amounts of energy to process raw data. The choice of data aggregation method depends on the application requirements as well as the relative energy savings obtained by using this method. As various sensor nodes often detect common phenomena, there will be some redundancy in the data. Meanwhile many applications deploy more sensors than the exact requirement so as to accurately sense the target phenomena. In this paper, importance of data gathering is explained; various Hierarchical clustering approaches are compared. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:378 / 384
页数:7
相关论文
共 50 条
  • [31] Confidentiality and integrity for data aggregation in WSN using peer monitoring
    Di Pietro, Roberto
    Michiardi, Pietro
    Molva, Refik
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 181 - 194
  • [32] Survey on Low Power Adaptive Image Compression Techniques for WSN
    Rekha, H.
    Samundiswary, P.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1128 - 1132
  • [33] An Energy Efficient and Reliable Location wise Data Aggregation In WSN
    Bhosle, Manish V.
    Nighot, Mininath K.
    Das, Somitra S.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 322 - 326
  • [34] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Ben Othman, Soufiene
    Bahattab, Abdullah Ali
    Trad, Abdelbasset
    Youssef, Habib
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 867 - 889
  • [35] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Soufiene Ben Othman
    Abdullah Ali Bahattab
    Abdelbasset Trad
    Habib Youssef
    Wireless Personal Communications, 2015, 80 : 867 - 889
  • [36] Data validation and integrity verification for trust based data aggregation protocol in WSN
    Daniel, Anita D.
    Roslin, S. Emalda
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [37] Research of Data Aggregation Routing Protocol in WSN Data-Related Applications
    Jia Xibei
    Zhang Huazhong
    Zhang Jingchen
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 647 - 651
  • [38] Quality- and Energy-Aware Data Compression by Aggregation in WSN Data Streams
    Cappiello, Cinzia
    Schreiber, Fabio A.
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 649 - 654
  • [39] Preserving privacy against external and internal threats in WSN data aggregation
    Lei Zhang
    Honggang Zhang
    Mauro Conti
    Roberto Di Pietro
    Sushil Jajodia
    Luigi Vincenzo Mancini
    Telecommunication Systems, 2013, 52 : 2163 - 2176
  • [40] Efficient data aggregation with node clustering and extreme learning machine for WSN
    Ihsan Ullah
    Hee Yong Youn
    The Journal of Supercomputing, 2020, 76 : 10009 - 10035