16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6779005
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of secure data aggregation protocols in wireless sensor networks

Abstract: Abstract-In order to conserve wireless sensor network (WSN) lifetime, data aggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secure approaches is to make sure that the aggregators aggregate the data in appropriate and secure way. In this paper we give the description of ESPDA (Energy-efficient and Secure Pattern-based Data Aggregation) and SRDA (Secure Reference-Based Data Aggregation) protocol that work on cluster… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…It has the highest detection rate, and at the same time it has the highest false positive rate. The misuse detection identifies the various types of attackers by equating or comparing the present attack behavior and the past attack behavior [9]. It has the highest accuracy but with low detection rate.…”
Section: Introductionmentioning
confidence: 99%
“…It has the highest detection rate, and at the same time it has the highest false positive rate. The misuse detection identifies the various types of attackers by equating or comparing the present attack behavior and the past attack behavior [9]. It has the highest accuracy but with low detection rate.…”
Section: Introductionmentioning
confidence: 99%
“…However, most of these reviews evaluated the secure clustering algorithms based on two main processes only, i.e., CH selection and cluster formation [10], [12], [13]. Other works discussed the existing secure routing protocols of clustering model with the aim of protecting the data transmission CHs and the base station [8], [14]- [16]. But for any secure clustering algorithm, a set of criteria must be used to be an effective one.…”
Section: Introductionmentioning
confidence: 99%