In order to conserve wireless sensor network (WSN) lifetime, dataaggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secu...
详细信息
ISBN:
(纸本)9788996865032
In order to conserve wireless sensor network (WSN) lifetime, dataaggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secure approaches is to make sure that the aggregators aggregate the data in appropriate and secure way. In this paper we give the description of ESPDA (Energy-efficient and secure Pattern-based dataaggregation) and SRDA (secure Reference-Based dataaggregation) protocol that work on cluster-based WSN and the deep security analysis that are different from the previously presented one.
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of dataaggregation is facing more and more ***,the dataaggregationprotocols mainly focus o...
详细信息
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of dataaggregation is facing more and more ***,the dataaggregationprotocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of *** performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in *** consideration of IWSN,we firstly review the security requirements and techniques in WSN dataaggregation in this ***,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted dataaggregation,end-to-end encrypted dataaggregation and unencrypted securedata *** this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for ***,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving dataaggregation in IWSN.
暂无评论