Secure data aggregation in wireless sensor networks essay




Secure Data Aggregation in Wireless Sensor Networks Abstract: In a large sensor network, data aggregation within the network significantly reduces the amount. In wireless sensor networks, a compromised sensor node may inject false data during data forwarding and aggregation to ensure the integrity of the aggregated data. It,secure data aggregation in wireless sensor networks. DOI: 10.1007, 978 - 3 - 642 - 13965 - 9 In book: Wireless Sensor Network Technologies, Secure Data Aggregation in Wireless Sensor Networks. Chapter. First online: 24 · 31. Cite this chapter. Download book pdf. Download, The main security challenges for such a process are: 1. prevent Byzantine-corrupt data from rendering the final whole meaningless and 2. this paper proposes a new scheme to secure the process of data aggregation by providing lightweight security This system is called Combinatorial Key. Existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and good security, making them susceptible to attacks. In this article, we introduce the secure data aggregation using SDAACA protocol for access control and authentication. The second part discusses data aggregation techniques and their role in the wireless sensor network and provides a comprehensive and accurate review of the literature applying these techniques. Finally, the main differences between data aggregation techniques were discussed, as well as the advantages and disadvantages of these techniques. Data aggregation in networks is an essential operation to reduce energy consumption in large-scale wireless sensor networks. However, with data aggregation, raw data items are invisible to the base. Data aggregation DA is a technique for collecting data in WSNs of wireless sensor networks. It offers benefits such as reporting consolidated data, reducing data redundancy, improving network lifetime, etc. However, deploying WSNs in hostile and remote environments introduces security vulnerabilities that can lead to SDAP: a secure hop- by-hop data aggregation protocol for sensor networks. ACM transactions on information and systems security TISSEC 11, 4 2008, 1 43. Google Scholar Digital Library Qiang Zhou, Geng Yang and Liwen He. 2014. A securely enhanced data aggregation based on ECC in wireless sensor networks; Abstract. Wireless sensor networks WSNs generate an enormous amount of explicit data usage. Such data, which is an excessively large issue, must be prepared and then transmitted to the base station. An attack-resistant computation algorithm is presented that allows the base station to safely calculate the number of predicates or sums even in the presence of such an attack. This algorithm shows that this algorithm outperforms other existing approaches. Wireless Sensor Networks WSNs are increasingly used in many applications, such as volcano and fire. Data aggregation in IoT, such as wireless sensor network WSN, is important, because in IoT we have collected heterogeneous data from different sources and more energy is required to transmit data. One of the solutions to save energy in this case is to process and aggregate data before the data is sent, and this time,





Please wait while your request is being verified...



100217911
49725116
34364060
76171720
39833967