Survey on secure data aggregation for wireless sensor networks
Citations Over TimeTop 14% of 2011 papers
Abstract
Data aggregation can significantly reduce the amount of data transmitted to the base station, therefore improve the energy efficiency and prolong the wireless network lifetime. However the sensor nodes may be deployed in remote and hostile environments where attackers may inject false information or forge aggregation values without being detected. Thus, security issue becomes an important research field in data aggregation for wireless sensor networks (WSNs). In this paper, the secure data aggregation schemes are categorized into hop by hop aggregation and end to end aggregation, and then the secure data aggregation schemes are reviewed and analyzed based on four phases: bootstrapping, data aggregation, verification and remedy. In addition, some topics for future search directions are pointed out.
Related Papers
- → Secure Data Aggregation in Vehicular-Adhoc Networks: A Survey(2012)20 cited
- → Survey on secure data aggregation for wireless sensor networks(2011)12 cited
- → Strategies for Sensor Data Aggregation in Support of Emergency Response(2014)7 cited
- → Energy efficient protocol in wireless sensor networks using mobile base station(2014)4 cited