Skip to main content

Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks

  • Conference paper
Information and Communication Technologies (ICT 2010)

Abstract

The primary use of wireless sensor networks (WSNs) is to collect and process data. Most of the energy consumption is due to data transmission. Because of the unique properties of WSNs all raw data samples are not directly sent to the sink node instead data aggregation is preferred. Since sensor nodes are deployed in an open environment such as a battlefield or similar applications, data confidentiality and integrity are vital issues in such conditions, hence secure aggregation is required. End to end secure aggregation is less demanding compared to hop by hop secure aggregation so former is superior. When aggregation is performed on data, crucial information is lost which may be indicating alarming situation. This paper presents an idea to reduce the amount of information transmitted with retention of critical data so that the problem area could be identified. Privacy Homomorphism(PH) preserves the data characteristics even in the encrypted form. This paper is based on the PH technique which provides secure data aggregation without significant loss of individuality of data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ozdemir, S., Yang, X.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Elsevier B.V., Amsterdam (2009) doi:10.1016/j.comnet.2009.02.023

    Google Scholar 

  2. Alzaid, H., Ernest, F., Juan, G.N.: Secure Data Aggregation in Wireless Sensor Network: A Survey. In: ACSC 2008, Australia (January 2008)

    Google Scholar 

  3. Pranay, T.: Data Aggregation in Cluster-based Wireless Sensor Networks. Thesis, IIIT Allhabad (July 2008)

    Google Scholar 

  4. Yingpeng, S., Hong, S.: Secure data aggregation in wireless sensor networks: a survey. In: Seventh International Conference PDCAT 2006 (December 2006)

    Google Scholar 

  5. Ramesh, R., Pramod, K.V.: Data aggregation techniques in sensor networks: A survey. IEEE Communications Surveys & Tutorials 8(4), 48–63 (2006)

    Article  Google Scholar 

  6. Ozdemir, S.: Concealed Data Aggregation in Heterogeneous sensor networks using privacy homomorphism. In: ICPS 2007: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007)

    Google Scholar 

  7. Joao, G., Dirk, W., Markus, S.: CDA:concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: 40th International Conference on Communications, IEEE ICC 2005 (May 2005)

    Google Scholar 

  8. Levent, E., Johan, H.Y.: Implementation of Domingo Ferrers a new privacy homomorphism in securing wireless sensor networks, WSN (2007)

    Google Scholar 

  9. Castelluccia, Aldar, C., Gene, T.: Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Transactions on Sensor Networks 5(3) (May 2009) Article 20

    Google Scholar 

  10. Barr, R., Hass, Z.J., Van Renesse, R.: JiST: Embedding Simulation Time into a Virtual Machine. In: 5th EUROSIM Congress on Modeling and Simulation, Paris, France (September 2004)

    Google Scholar 

  11. Barr, R., Zygmunt, J.H., Van Renesse, R.: JiST: An efficient approach to simulation using virtual machines. Software Practice and experience, 1–7 (2004)

    Google Scholar 

  12. Barr, R.: SWANSScalable Wireless Ad hoc Network Simulator. User Guide (March 19, 2004)

    Google Scholar 

  13. Trishla, S., Imad, M., Ali, H., Ahmed, B.: Implementation of an Energy Model for JiST/SWANS Wireless Network Simulator. In: Sixth International Conference, ICN 2007 (April 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Solanki, P., Raval, G., Pradhan, S. (2010). Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics