Abstract
The primary use of wireless sensor networks (WSNs) is to collect and process data. Most of the energy consumption is due to data transmission. Because of the unique properties of WSNs all raw data samples are not directly sent to the sink node instead data aggregation is preferred. Since sensor nodes are deployed in an open environment such as a battlefield or similar applications, data confidentiality and integrity are vital issues in such conditions, hence secure aggregation is required. End to end secure aggregation is less demanding compared to hop by hop secure aggregation so former is superior. When aggregation is performed on data, crucial information is lost which may be indicating alarming situation. This paper presents an idea to reduce the amount of information transmitted with retention of critical data so that the problem area could be identified. Privacy Homomorphism(PH) preserves the data characteristics even in the encrypted form. This paper is based on the PH technique which provides secure data aggregation without significant loss of individuality of data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ozdemir, S., Yang, X.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Elsevier B.V., Amsterdam (2009) doi:10.1016/j.comnet.2009.02.023
Alzaid, H., Ernest, F., Juan, G.N.: Secure Data Aggregation in Wireless Sensor Network: A Survey. In: ACSC 2008, Australia (January 2008)
Pranay, T.: Data Aggregation in Cluster-based Wireless Sensor Networks. Thesis, IIIT Allhabad (July 2008)
Yingpeng, S., Hong, S.: Secure data aggregation in wireless sensor networks: a survey. In: Seventh International Conference PDCAT 2006 (December 2006)
Ramesh, R., Pramod, K.V.: Data aggregation techniques in sensor networks: A survey. IEEE Communications Surveys & Tutorials 8(4), 48–63 (2006)
Ozdemir, S.: Concealed Data Aggregation in Heterogeneous sensor networks using privacy homomorphism. In: ICPS 2007: IEEE International Conference on Pervasive Services, Istanbul, Turkey, pp. 165–168 (2007)
Joao, G., Dirk, W., Markus, S.: CDA:concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: 40th International Conference on Communications, IEEE ICC 2005 (May 2005)
Levent, E., Johan, H.Y.: Implementation of Domingo Ferrers a new privacy homomorphism in securing wireless sensor networks, WSN (2007)
Castelluccia, Aldar, C., Gene, T.: Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Transactions on Sensor Networks 5(3) (May 2009) Article 20
Barr, R., Hass, Z.J., Van Renesse, R.: JiST: Embedding Simulation Time into a Virtual Machine. In: 5th EUROSIM Congress on Modeling and Simulation, Paris, France (September 2004)
Barr, R., Zygmunt, J.H., Van Renesse, R.: JiST: An efficient approach to simulation using virtual machines. Software Practice and experience, 1–7 (2004)
Barr, R.: SWANSScalable Wireless Ad hoc Network Simulator. User Guide (March 19, 2004)
Trishla, S., Imad, M., Ali, H., Ahmed, B.: Implementation of an Energy Model for JiST/SWANS Wireless Network Simulator. In: Sixth International Conference, ICN 2007 (April 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Solanki, P., Raval, G., Pradhan, S. (2010). Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-15766-0_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15765-3
Online ISBN: 978-3-642-15766-0
eBook Packages: Computer ScienceComputer Science (R0)