• Corpus ID: 212440013

SDACQ: Secure Data Aggregation for Coexisting Queries in Wireless Sensor Networks

  title={SDACQ: Secure Data Aggregation for Coexisting Queries in Wireless Sensor Networks},
  author={E. G. Prathima and S. Sitharama Iyengar and Lalit M. Patnaik},
Wireless Sensor Network consists of sensor nodes that are constrained in energy and other resources and is vulnerable to security attacks since the inherent nature of communication is broadcast. In order to reduce the energy consumption it is necessary to optimize the number of packets transmitted. In addition the data has to be encrypted to withstand security attacks. We propose Secure Data Aggregation for Coexisting Queries (SDACQ) in Wireless Sensor Networks that allows parallel coexisting… 

Figures and Tables from this paper

An Energy E cient Secure Data Aggregation in Wireless Sensor Networks
The efficiency of data aggregation is investigated, how to develop cluster-based routing algorithms to achieve the lowest energy consumption for aggregating data, and security issues in wsn are investigated.
A Review on Self Controllable Routing Protocol with Shortest Path in VANET
  • K. Saini
  • Computer Science
    International Journal for Research in Applied Science and Engineering Technology
  • 2020
This work provides a review on self controllable routing protocol with shortest path and proposes mobility based dynamic reconfiguration system in VANET, which accomplishes the goal of meeting the need of different applications and different network conditions.
Self Reconfigurable Protocol among Vehicles with Dynamic Routing
By providing access for the user to construct different virtual fields, proposed protocol accomplishes the goal of meeting the need of different applications and different network conditions, and gives the administrator a powerful ability to reconfiguration remotely.
A Review on Collision Avoidance System among Vehicles in Narrow Trajectory
In this work, it presents a scenario of various techniques based dynamic system in VANET, and provides a review on self controllable routing protocol with shortest path on Vehicular Adhoc Network.


Efficient aggregation of encrypted data in wireless sensor networks
This paper proposes a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data and shows that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks
A practical secure data aggregation scheme, Sen-SDA, based on an additive homomorphic encryption scheme, an identity-based signature scheme, and a batch verification technique with an algorithm for filtering injected false data is proposed.
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks
A new concealed data aggregation scheme extended from Boneh et al.'s homomorphic public encryption system is proposed, designed for a multi-application environment and mitigates the impact of compromising attacks in single application environments.
Simulation and experimental results show that this work provides a secure privacy preserving data centric sensor network based on cryptographic keys and reduces the message overhead and incurs a minimum communication cost compared to previous works.
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks that eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission and can be practically implemented in on-the-shelf sensor platforms.
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation
An approach that conceals sensed data end-to-end by still providing efficient and flexible in-network data aggregation is presented and it is shown that the approach is feasible for the class of "going down" routing protocols.
Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks
This paper revisits and investigates the applicability of additively homomorphic public-key encryption algorithms for certain classes of wireless sensor networks and provides recommendations for selecting the most suitable public key schemes for different topologies and wireless sensor network scenarios.
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks
The scheme not only provides efficient countermeasure against passive and active privacy compromising attacks, coalition attacks from malicious base station and captured sensor nodes, but also is robust to data loss, making it suitable to be used in large scale WSNs.