Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review

Wireless sensor networks (WSN) are made up of energy constraint tiny sensing devices which are distributed geographically to monitor inhabited remote areas by collecting the physical phenomenon like temperature, pressure etc. They play a vital role in military surveillance, environment monitoring et...

Full description

Saved in:
Bibliographic Details
Published inArchives of computational methods in engineering Vol. 26; no. 4; pp. 1007 - 1027
Main Authors Vinodha, D., Mary Anita, E. A.
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 01.09.2019
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Wireless sensor networks (WSN) are made up of energy constraint tiny sensing devices which are distributed geographically to monitor inhabited remote areas by collecting the physical phenomenon like temperature, pressure etc. They play a vital role in military surveillance, environment monitoring etc. Unstructured topology in WSN results in large amount of redundant data being transmitted over the resource constraint devices which leads to energy starvation problem. Since the nodes are prone to tamper, thanks to their environment, ensuring the privacy of sensitive data being aggregated and transmitted is important. Hence data aggregation schemes which minimize the data redundancy with the guarantee of security become the attraction of research. Many secured aggregation schemes have been proposed by researchers. In this survey the various existing solutions are surveyed and an attempt is made to classify them based on the node topology and mechanisms employed for assuring privacy.
ISSN:1134-3060
1886-1784
DOI:10.1007/s11831-018-9267-2