Security Analysis of Secure Data Aggregation Protocols in Wireless Sensor Networks

被引:0
|
作者
Rahayu, Triana Mugia [1 ]
Lee, Sang-Gon [1 ]
Lee, Hoon-Jae [1 ]
机构
[1] Dongseo Univ, Dept Ubiquitous IT, Div Comp & Informat Engn, Busan, South Korea
来源
2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT) | 2014年
关键词
Data aggregation protocol; secure data aggregation protocol; ESPDA; SRDA; WSN;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In order to conserve wireless sensor network (WSN) lifetime, data aggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secure approaches is to make sure that the aggregators aggregate the data in appropriate and secure way. In this paper we give the description of ESPDA (Energy-efficient and Secure Pattern-based Data Aggregation) and SRDA (Secure Reference-Based Data Aggregation) protocol that work on cluster-based WSN and the deep security analysis that are different from the previously presented one.
引用
收藏
页码:471 / 474
页数:4
相关论文
共 50 条
  • [41] A Security Scheme for Wireless Sensor Networks
    Fouchal, Hacene
    Biesa, Javier
    Romero, Elena
    Araujo, Alvaro
    Taladrez, Octavio Nieto
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [42] A Survey of security in Wireless Sensor Networks
    Rani, Aditi
    Kumar, Sanjeet
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [43] A New Data Link Layer Security Protocol for Wireless Sensor Networks
    Bandirmali, Necla
    Erturk, Ismail
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2009, 12 (04): : 235 - 242
  • [44] Threats to Security of Wireless Sensor Networks
    Tyagi, Akshat
    Kushwah, Juhi
    Bhalla, Monica
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 402 - 405
  • [45] Towards Secure Data Forwarding with ANFIS and Trust Evaluation in Wireless Sensor Networks
    Renjith, P. N.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 765 - 781
  • [46] A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks
    Zeng, Yu
    Zhang, Xing
    Akhtar, Rizwan
    Wang, Changda
    2018 14TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2018), 2018, : 13 - 18
  • [47] Towards Secure Data Forwarding with ANFIS and Trust Evaluation in Wireless Sensor Networks
    P. N. Renjith
    Wireless Personal Communications, 2020, 114 : 765 - 781
  • [48] A SURVEY ON EFFICIENT CRYPTOGRAPHIC APPROACH FOR DATA SECURITY IN WIRELESS SENSOR NETWORKS
    Ilakkiya, S.
    Mailsamy, M.
    Britto, J. Gladson Maria
    IIOAB JOURNAL, 2016, 7 (09) : 709 - 715
  • [49] Fault-tolerant aggregator election and data aggregation in wireless sensor networks
    Larrea, Mikel
    Martin, Cristian
    Javier Astrain, Jose
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (02) : 93 - 115
  • [50] Clustering and Data Aggregation in Wireless Sensor Networks Using Machine Learning Algorithms
    Shahina, K.
    Vaidehi, V.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 109 - 115