2013
DOI: 10.5815/ijcnis.2013.07.08
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey

Abstract: The data aggregation is a widely used energy-efficient mechanism in wireless sensor Networks (WSNs), by avoiding the redundant data transmitting to base station. The deployment of wireless communicating sensor nodes in the hostile or unattended environment causes attack more easily and the resource limited characteristics make the conventional security algorithms infeasible, hence protecting privacy and integrity during data aggregation is a challenging task. The privacy of a sensor data ensures, it is known o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…As an example, let h = -567. 23 In general, the range of the elements of a row vector corresponding to a positive or negative decimal number, is -9 to +9. A few numerical examples are shown in Table 3 for L = 6.…”
Section: Representation Of a Negative Decimal Numbermentioning
confidence: 99%
See 2 more Smart Citations
“…As an example, let h = -567. 23 In general, the range of the elements of a row vector corresponding to a positive or negative decimal number, is -9 to +9. A few numerical examples are shown in Table 3 for L = 6.…”
Section: Representation Of a Negative Decimal Numbermentioning
confidence: 99%
“…Let their equivalents row vectors be G and H each with size 1x(L+K). Append R1, S1 and R2, S2 to G and H respectively to get Q1 and Q2 as, (23) The size of Q1 as well as Q2 is 1x(L+K+2) = 1xn. (Note that n = L+K+2).…”
Section: Homomorphic Additionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because of the emergence of numerous decentralized aggregation protocols, many studies have been performed in order to compare their performance [12][13][14][15][16] in the context of network management. Other surveys have been performed in the context of wireless sensor networks [17][18][19][20][21][22][23][24][25][26][27].…”
Section: Related Workmentioning
confidence: 99%
“…In the context of wireless sensor networks, some surveys [19,22,23,25,26] are out of the scope of this paper as they primarily focus on security and encryption schemes that can be embedded in aggregation protocols without discussing aggregation performances. The other surveys focus on aggregation protocol performance under resource consumption constraints [17,18,20,24,27].…”
Section: Related Workmentioning
confidence: 99%