[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ISM.2014.84guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network

Published: 10 December 2014 Publication History

Abstract

Wireless sensor network (WSN) consists of resource constraint sensor nodes where nodes (sensors) send data to the base station/sink node and communicate with each other by either forming a cluster or without forming a cluster. Data aggregation in WSN takes place at the responsible nodes (aggregators) in a cluster before sending data to the base station, based on the query that is received from the base station. Thus data aggregation reduces energy consumption of the nodes due to minimized communication. As a result, the life time of the individual sensors prolong in the case of aggregation compared to the data transmission that occurs without performing aggregation. One of the major security challenges for data aggregation in WSN is that the aggregators expose clear data at the aggregation level. Therefore, this aggregation level is vulnerable to attacks by intruders. Existing research has addressed this problem and proposed solutions by considering static node topology of WSN. However, in WSN the nodes can either be static or dynamic. Therefore, the existing approaches do not tackle the security issues that arise in dynamic node WSN. The proposed research aims to explore this problem and propose solutions based on a cryptographic approach.
  1. A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ISM '14: Proceedings of the 2014 IEEE International Symposium on Multimedia
    December 2014
    403 pages
    ISBN:9781479943111

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 10 December 2014

    Author Tags

    1. Data aggregation
    2. availbaility
    3. confidentiality
    4. integrity
    5. pairing-based cryptography
    6. wireless sensor network

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Jan 2025

    Other Metrics

    Citations

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media