Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review

被引:19
|
作者
Vinodha, D. [1 ,2 ]
Anita, E. A. Mary [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] SA Engn Coll, CSE, Chennai, Tamil Nadu, India
关键词
CONCEALED DATA AGGREGATION; FULLY HOMOMORPHIC ENCRYPTION; SCHEME;
D O I
10.1007/s11831-018-9267-2
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless sensor networks (WSN) are made up of energy constraint tiny sensing devices which are distributed geographically to monitor inhabited remote areas by collecting the physical phenomenon like temperature, pressure etc. They play a vital role in military surveillance, environment monitoring etc. Unstructured topology in WSN results in large amount of redundant data being transmitted over the resource constraint devices which leads to energy starvation problem. Since the nodes are prone to tamper, thanks to their environment, ensuring the privacy of sensitive data being aggregated and transmitted is important. Hence data aggregation schemes which minimize the data redundancy with the guarantee of security become the attraction of research. Many secured aggregation schemes have been proposed by researchers. In this survey the various existing solutions are surveyed and an attempt is made to classify them based on the node topology and mechanisms employed for assuring privacy.
引用
收藏
页码:1007 / 1027
页数:21
相关论文
共 50 条
  • [21] Secure encrypted-data aggregation for wireless sensor networks
    Huang, Shih-I
    Shieh, Shiuhpyng
    Tygar, J. D.
    [J]. WIRELESS NETWORKS, 2010, 16 (04) : 915 - 927
  • [22] Secure Cluster based Data Aggregation in Wireless Sensor Networks
    Ranjani, S. Siva
    Radhakrishnan, S.
    Thangaraj, C.
    [J]. 2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [23] Secure Data Aggregation Scheme in Wireless Sensor Networks for IoT
    Alghamdi, Ahmed
    Alshamrani, Mesfar
    Alqahtani, Abdullah
    Al Ghamdi, Sultan Safar A.
    Harrathi, Rami
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [24] Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks
    Liu, Ying
    Peng, Hui
    Wu, Yuncheng
    Zeng, Juru
    Chen, Hong
    Wang, Ke
    Lai, Weiling
    Li, Cuiping
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2018, PT I, 2018, 10827 : 717 - 733
  • [25] Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 188 - 195
  • [26] A Comparison of Secure Data Aggregation Schemes for Wireless Sensor Networks
    Boppana, Rajendra V.
    Pan, Pengjun
    [J]. 16TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), PROCEEDINGS, 2009, : 179 - 188
  • [27] Secure encrypted-data aggregation for wireless sensor networks
    Shih-I Huang
    Shiuhpyng Shieh
    J. D. Tygar
    [J]. Wireless Networks, 2010, 16 : 915 - 927
  • [28] Secure data aggregation in wireless sensor networks: A comprehensive overview
    Ozdemir, Suat
    Xiao, Yang
    [J]. COMPUTER NETWORKS, 2009, 53 (12) : 2022 - 2037
  • [29] Secure Data Aggregation and Intrusion Detection in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2015, : 127 - 131
  • [30] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52