• Corpus ID: 212438017

A Survey on Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks

@inproceedings{Priyadarsini2016ASO,
  title={A Survey on Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks},
  author={Ch. Indira Priyadarsini and Dr. R. Prema},
  year={2016}
}
Wireless Sensor Networks (WSNs) consist of a large number of sensor devices which use battery powered energy. More energy is wasted while sensing the information and transmitting the data. To save energy in WSNs data aggregation technique is used. It could cause some security problems since false may be injected during data aggregation by data aggregator. We focus on data aggregation problems in security and energy constrained in sensor networks. In this paper, we present a survey of secure… 

References

SHOWING 1-10 OF 13 REFERENCES
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact
TLDR
An attack-resilient computation algorithm is presented to enable the base station to securely compute predicate count or sum even in the presence of such an attack, and shows that this algorithm outperforms other existing approaches.
Secure Data Aggregation in Wireless Sensor Networks
TLDR
The synopsis diffusion approach is made secure against attacks in which compromised nodes contribute false subaggregate values, and a novel lightweight verification algorithm by which the base station can determine if the computed aggregate includes any false contribution.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
TLDR
An improvement for iterative filtering techniques is proposed by providing an initial approximation for such algorithms which makes them not only collusion robust, but also more accurate and faster converging.
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
TLDR
This paper proposes integration of system monitoring modules and intrusion detection modules in the context of WSNs, and proposes an extended Kalman filter (EKF) based mechanism to detect false injected data.
Secure Continuous Aggregation in Wireless Sensor Networks
TLDR
Compared with the existing schemes, this scheme greatly reduces the verification cost by checking only a small part of aggregation results to verify the correctness of the temporal variation patterns in a time window and enables the scheme independent of any particular in-network aggregation protocols as opposed to existing schemes.
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks
TLDR
A new concealed data aggregation scheme extended from Boneh et al.'s homomorphic public encryption system is proposed, designed for a multi-application environment and mitigates the impact of compromising attacks in single application environments.
Capacity and Delay Analysis for Data Gathering with Compressive Sensing in Wireless Sensor Networks
TLDR
This paper applies the theory of CS to data gathering for a WSN where n nodes are randomly deployed, and constructs a simple architecture for multi-session data gathering with CS and validates the theoretical results for the scaling laws of the capacity.
Efficient Data Gathering with Mobile Collectors and Space-Division Multiple Access Technique in Wireless Sensor Networks
TLDR
This paper proposes a region-division and tour-planning algorithm in which data gathering time is balanced among different regions and carries out extensive simulations and demonstrates that the proposed algorithms significantly outperform single SenCar and non-SDMA schemes.
Compressed Data Aggregation: Energy-Efficient and High-Fidelity Data Collection
TLDR
This paper makes use of diffusion wavelets to find a sparse basis that characterizes the spatial (and temporal) correlations well on arbitrary WSNs, which enables straightforward CS-based data aggregation as well as high-fidelity data recovery at the sink.
Iterative Filtering in Reputation Systems
TLDR
A natural and intuitive nonlinear formula is proposed and an iterative algorithm that linearly converges to the unique vector of reputations is provided, making the algorithm efficient for large data sets.
...
...