Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review

被引:19
|
作者
Vinodha, D. [1 ,2 ]
Anita, E. A. Mary [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] SA Engn Coll, CSE, Chennai, Tamil Nadu, India
关键词
CONCEALED DATA AGGREGATION; FULLY HOMOMORPHIC ENCRYPTION; SCHEME;
D O I
10.1007/s11831-018-9267-2
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless sensor networks (WSN) are made up of energy constraint tiny sensing devices which are distributed geographically to monitor inhabited remote areas by collecting the physical phenomenon like temperature, pressure etc. They play a vital role in military surveillance, environment monitoring etc. Unstructured topology in WSN results in large amount of redundant data being transmitted over the resource constraint devices which leads to energy starvation problem. Since the nodes are prone to tamper, thanks to their environment, ensuring the privacy of sensitive data being aggregated and transmitted is important. Hence data aggregation schemes which minimize the data redundancy with the guarantee of security become the attraction of research. Many secured aggregation schemes have been proposed by researchers. In this survey the various existing solutions are surveyed and an attempt is made to classify them based on the node topology and mechanisms employed for assuring privacy.
引用
收藏
页码:1007 / 1027
页数:21
相关论文
共 50 条
  • [1] Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review
    D. Vinodha
    E. A. Mary Anita
    [J]. Archives of Computational Methods in Engineering, 2019, 26 : 1007 - 1027
  • [2] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [3] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [4] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [5] Secure and reliable data aggregation for wireless sensor networks
    Ozdemir, Suat
    [J]. UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4836 : 102 - 109
  • [6] Survey on Secure Data Aggregation in Wireless Sensor Networks
    Gaikwad, Priyanka B.
    Dhage, Manisha R.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 242 - 246
  • [7] Secure data aggregation in wireless sensor networks: A survey
    Sang, Yingpeng
    Shen, Hong
    Inoguchi, Yasushi
    Tan, Yasuo
    Xiong, Naixue
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 315 - +
  • [8] Secure and transparent data aggregation for wireless sensor networks
    Guo, Jiang-Hong
    Ma, Jian-Feng
    [J]. Tongxin Xuebao/Journal on Communications, 2012, 33 (10): : 51 - 59
  • [9] Credible Secure Data Aggregation in Wireless Sensor Networks
    Anuradha, M. P.
    Ganapathy, Gopinath
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 395 - 404
  • [10] A taxonomy of secure data aggregation in wireless sensor networks
    Alzaid, Hani
    Foo, Ernest
    Nieto, Juan Manuel Gonzalez
    Park, DongGook
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 8 (1-2) : 101 - 148