Security and efficiency in wireless sensor Network Data Aggregator Design

Authors

  • Phakade Shirish Vitthalrao PhD Student Author
  • Dr. C. Ram Singla Sunrise University, Alwar Author
  • Dr. Omprakash Rajankar NBN,S.C.O.E., Pune Author

DOI:

https://doi.org/10.29070/11e6ng37

Keywords:

Wireless Sensor Network, Security, Data Aggregation, Communication

Abstract

Most wireless sensor networks are composed of a large number of low-cost sensor nodes withvery limited sensing, computing and communication capabilities. Since sensor nodes often have limitedresources, it is necessary to maximize both the average sensor lifetime and total bandwidth usage byminimizing the amount of data sent. Information overload in a network can be reduced by data aggregation,which involves compiling and synthesizing input from multiple sensors. Sensor nodes in wireless sensornetworks are vulnerable to node compromise attacks, and security concerns such as data confidentialityand integrity are of paramount importance due to the sensitive nature of the information beingtransmitted. Thus, security should be a primary consideration in the development of protocols for use inwireless sensor networks, such as those used to collect data.In a wireless sensor network, dataaggregation is an essential approach. Because by pooling together data, we can cut down on wastefulduplication and thereby save energy. In wireless sensor networks, extending the network's lifetime is themost difficult challenge, however this may be achieved by data aggregation.

Downloads

Download data is not yet available.

References

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Commun. Mag. 40 (8) (2002) 102– 114.

J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) (2008) 2292–2330.

K. Akkaya, M. Demirbas, R.S. Aygun, The Impact of Data Aggregation on the Performance of Wireless Sensor Networks, Wiley Wireless Commun. Mobile Comput. (WCMC) J. 8 (2008) 171–193.

J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis and defenses, in: Proceedings of the Third IEEE/ ACM Information Processing in Sensor Networks (IPSN’04), 2004, pp. 259–268.

Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5) (2002) 521–534.

E. Fasolo, M. Rossi, J. Widmer, M. Zorzi, In-network aggregation techniques for wireless sensor networks: a survey, IEEE Wireless Commun. 14 (2) (2007) 70–87.

R. Rajagopalan, P.K. Varshney, Data aggregation techniques in sensor networks: a survey, IEEE Commun. Surveys Tutorials 8 (4) (2006).

S. Madden et al., TAG: A Tiny AGgregation Service for Ad Hoc Sensor Networks, OSDI, Boston, MA, 2002.

B. Zhou et al., A Hierarchical Scheme for Data Aggregation in Sensor Network, IEEE ICON 04, Singapore, 2004.

M. Lee, V.W.S. Wong, An Energy-Aware Spanning Tree Algorithm for Data AggrAegation in Wireless Sensor Networks, IEEE PacRrim, Victoria, BC, Canada, 2005.

S. Lindsey, C. Raghavendra, K.M. Sivalingam, Data gathering algorithms in sensor networks using energy metrics, IEEE Trans. Parallel Distrib. Sys. 13 (9) (2002) 924–935.

G. Di Bacco, T. Melodia, F. Cuomo, A MAC Protocol for DelayBounded Applications in Wireless Sensor Networks, Med-Hoc-Net, Bodrum, Turkey, 2004.

W.B. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, An application-specific protocol architecture for wireless microsensor networks, IEEE Trans. Wireless Commun. 1 (4) (2002) 660– 670.

Y. Yao, J. Gehrke, The Cougar approach to in-network query processing in sensor networks, ACM SIGMOD Rec. 31 (3) (2002) 9– 18.

Downloads

Published

2022-03-01