2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN) 2010
DOI: 10.1109/wocn.2010.5587353
|View full text |Cite
|
Sign up to set email alerts
|

SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…Decryption is performed as described in eq. (15) and (16). SUM: S1=D 2 -Dif sum , SUM: S2= k right bit shift D 1 (20) Now that BS posses all the information required for integrity verification it compares sum of secret SEC T it has calculated with received one.…”
Section: Integrity Checking and Sum Results Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Decryption is performed as described in eq. (15) and (16). SUM: S1=D 2 -Dif sum , SUM: S2= k right bit shift D 1 (20) Now that BS posses all the information required for integrity verification it compares sum of secret SEC T it has calculated with received one.…”
Section: Integrity Checking and Sum Results Generationmentioning
confidence: 99%
“…In literature many approaches [7,[11][12][13][14][15][16][17] for providing authentication and data integrity is proposed. Some provides perfect authentication but they either impose extra overhead for computation or provides delayed authentication.…”
Section: Protocols For Data Authentication and Integritymentioning
confidence: 99%
“…However, this scheme requires that identifiers of all participants are sent to ensure accuracy of the aggregated results, which increases the transmission overhead. The authors of [17] proposed an approach to avoid identifiers transmission; the algorithm requires that all nodes respond to the query from the base station and values of nodes having no sensed data are set to zero.…”
Section: Related Workmentioning
confidence: 99%
“…Secure End-to-End Data Aggregation in Wireless Sensor Networks [15] this paper represents a protocol for secure data aggregation, called secure end-to-end data aggregation, it provides end-to end data privacy of the aggregated data, the data is encrypted at sensor nodes and decrypted by the base station .This protocol uses additive homomorphic encryption technique for encryption of the data.…”
Section: Literature Surveymentioning
confidence: 99%