首页 | 本学科首页   官方微博 | 高级检索  
     


Secure data aggregation in wireless sensor networks: A comprehensive overview
Authors:Suat Ozdemir  Yang Xiao
Affiliation:1. Computer Engineering Department, Gazi University, Maltepe, Ankara, TR-06570, Turkey;2. Department of Computer Science, The University of Alabama, Tuscaloosa, AL 35487-0290, United States;1. School of Control and Computer Engineering, North China Electric Power University, Beijing, China;2. Department of Mathematics and Computer Science, Fayetteville State University, Fayetteville, NC, USA;3. School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China;4. School of Computer, Beijing Institute of Technology, Beijing, China;1. School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China;2. Universitat Rovira i Virgili, Department of Computer Engineering and Mathematics, UNESCO Chair in Data Privacy, Av. Països Catalans 26, E-43007 Tarragona, Catalonia, Spain;1. The Department of Electrical and Computer Engineering, Florida International University, Miami, FL, 33174, USA;2. The Department of Computer & Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL, 33431, USA;1. School of Computer Science, Guangzhou University, Guangzhou, China;2. Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada;3. School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China;1. STIC Laboratory, University of Tlemcen, Algeria;2. Drive Laboratory, University of Burgundy, Nevers, France
Abstract:Wireless sensor networks often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to resource restricted sensor nodes, it is important to minimize the amount of data transmission so that the average sensor lifetime and the overall bandwidth utilization are improved. Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network. As wireless sensor networks are usually deployed in remote and hostile environments to transmit sensitive information, sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and integrity are extremely important. Hence, wireless sensor network protocols, e.g., data aggregation protocol, must be designed with security in mind. This paper investigates the relationship between security and data aggregation process in wireless sensor networks. A taxonomy of secure data aggregation protocols is given by surveying the current “state-of-the-art” work in this area. In addition, based on the existing research, the open research areas and future research directions in secure data aggregation concept are provided.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号