Survey on End-To-End Confidentiality in Wireless Sensor Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2

Abstract

A wireless sensor network (WSN) is a collection of a large number of sensor nodes and few sink nodes that have limited Computation, communication and power resources. Data aggregation is used to reduce amount of data transmission and increases the lifetime of sensors. Data aggregation is the process of combining the raw data from one or more sensor nodes and performs operations as min, max, count, avg. The sensor nodes are often deployed in hostile environment so the aggregated result should be protected from the various types of attacks in order to achieve the data integrity-confidentiality and authentication. The various approaches given for the secure data aggregation is classified into two groups, secure data aggregation on unencrypted data and secure data aggregation on encrypted data. The paper proposes a detailed survey on secure data aggregation on encrypted data.

Authors and Affiliations

T. Gowtham , D. Sathya

Keywords

Related Articles

Energy Efficient Optimal Multicast Routing Protocol for MANETs

Power-efficient multicast routing is just one of the essential issues in the subject of mobile ad hoc networks. Multicasting is actually a phrase which means delivering data packets to several mobile nodes from an projec...

Performance Enhancement in Power aware Ad hoc Routing using Highly Probable Link

In today’s fast-moving world connectivity is the biggest trend to look out for and connecting devices with varying specifications is not a simple task. This becomes more of a problem in an environment where all devices,...

Enhance the XML Documents Security using Web Services

An increasing amount of semi-structured data, XML has become fundamental to humans and programs. XML changed by the World Wide Web Consortium (w3c) is quickly emerging as a new standard language for semi-structured data...

Mining of Spatially Co-Located Moving Objects by Using CTMSPMINE

In day to day life, vehicles have become important aspects in human life where each vehicle is manufactured for a particular purpose. Co-location pattern discovery is intended towards the processing data with spatial per...

A Support Vector Machine and Information Gain based Classification Framework for Diabetic Retinopathy Images

Image mining is the process of applying data analysis and discovery algorithms over large volume of image data. It has especially become popular in the fields of forensic sciences, fraud analysis and health care, for it...

Download PDF file
  • EP ID EP115932
  • DOI -
  • Views 133
  • Downloads 0

How To Cite

T. Gowtham, D. Sathya (2014). Survey on End-To-End Confidentiality in Wireless Sensor Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(2), 110-114. https://europub.co.uk./articles/-A-115932