The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Resilient secure aggregation for vehicular networks
IEEE Network: The Magazine of Global Internetworking
Secure and reliable data aggregation for wireless sensor networks
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Privacy and robustness for data aggregation in wireless sensor networks
Proceedings of the 17th ACM conference on Computer and communications security
Lifespan-aware routing for wireless sensor networks
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II
A dynamic security framework for ambient intelligent systems: a smart-home based eHealth application
Transactions on computational science X
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
ACMOS'09 Proceedings of the 11th WSEAS international conference on Automatic control, modelling and simulation
Efficient data aggregation with in-network integrity control for WSN
Journal of Parallel and Distributed Computing
Multisensor data fusion: A review of the state-of-the-art
Information Fusion
SeDyA: secure dynamic aggregation in VANETs
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Internet of Things (IoT): A vision, architectural elements, and future directions
Future Generation Computer Systems
Lifetime Optimization by Load-Balanced and Energy Efficient Tree in Wireless Sensor Networks
Mobile Networks and Applications
Hi-index | 0.00 |
Data aggregation is a widely used technique in wireless sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There has been many related work proposed to address these security issues. In this paper we survey these work and classify them into two cases: hop-by-hop encrypted data aggregation and end-to-end encrypted data aggregation. We also propose two general frameworks for the two cases respectively. The framework for end-to-end encrypted data aggregation has higher computation cost on the sensor nodes, but achieves stronger security, in comparison with the framework for hop-by-hop encrypted data aggregation.