Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis
@article{Kumar2009SecureHD, title={Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis}, author={Vimal Kumar and S. Madria}, journal={2012 IEEE 13th International Conference on Mobile Data Management}, year={2009}, pages={196-201} }
Secure data aggregation in wireless sensor networks has two contrasting objectives, i) Efficiently collecting and aggregating data and ii) Aggregating the data securely. Many schemes do not take into account the possibility of corrupt aggregators and allow the aggregator to decrypt data in hop by hop algorithms. On the other hand using public key cryptography for providing end to end security is not energy efficient. In this paper we present and analyze the performance of the secure… Expand
Figures and Topics from this paper
29 Citations
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
- Computer Science
- Ad Hoc Networks
- 2015
- 44
- PDF
Secure Data Aggregation to Preserve Data and Key Privacy in Wireless Sensor Networks with Multiple Sinks
- Computer Science
- 2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
- 2019
- 1
Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks
- Computer Science
- J. Inf. Hiding Multim. Signal Process.
- 2016
- 3
- PDF
A Concealed Data Aggregation Using PrivacyHomomorphism in Wireless Sensor Networks
- Computer Science
- 2014
- PDF
Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks
- Computer Science
- 2017 2nd International Conference on Computing and Communications Technologies (ICCCT)
- 2017
- 7
Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks
- Computer Science
- 2014 International Conference on Advanced Networking Distributed Systems and Applications
- 2014
- 4
A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs
- Computer Science
- 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)
- 2019
- 1
- Highly Influenced
- PDF
PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks
- Computer Science
- 2013 IEEE 32nd International Symposium on Reliable Distributed Systems
- 2013
- 20
References
SHOWING 1-10 OF 36 REFERENCES
Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks
- Computer Science
- 2010 Fourth International Conference on Sensor Technologies and Applications
- 2010
- 31
- PDF
SecureDAV: a secure data aggregation and verification protocol for sensor networks
- Computer Science
- IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
- 2004
- 157
- PDF
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks
- Computer Science
- 2008 International Conference on Embedded Software and Systems
- 2008
- 33
- PDF
Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs)
- Computer Science
- ICWN
- 2007
- 22
- PDF
Efficient aggregation of encrypted data in wireless sensor networks
- Computer Science
- The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
- 2005
- 588
- PDF
Confidentiality and integrity for data aggregation in WSN using peer monitoring
- Computer Science
- Secur. Commun. Networks
- 2009
- 49
- PDF
Modeling on Secure Data Aggregation of Wireless Sensor Networks Based on Evaluation of Creditability
- Computer Science
- 2010 International Conference on Internet Technology and Applications
- 2010
- 12