Secure Data Aggregation in Wireless Sensor Networks: A survey
Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan M. (2008) Secure Data Aggregation in Wireless Sensor Networks: A survey. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia, pp. 93-105.
Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in the WSN. With this in mind, the security issues in data aggregation for the WSN will be discussed in this paper. Then, the adversarial model that can be used in any aggregation scheme will be explained. After that, the "state-of-the-art" proposed secure data aggregation schemes will be surveyed and then classified into two categories based on the number of aggregator nodes and the existence of the verification phase. Finally, a conceptual framework will be proposed to provide new designs with the minimum security requirements against certain type of adversary. This framework gives a better understanding of those schemes and facilitates the evaluation process.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||security, aggregation, wireless sensor networks, survey|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2007 Australian Computer Society|
|Copyright Statement:||Reproduced in accordance with the copyright policy of the publisher.|
|Deposited On:||19 Mar 2008 00:00|
|Last Modified:||29 Feb 2012 13:45|
Repository Staff Only: item control page