Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Wireless sensor network
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Secure data aggregation=== This is a form of in-network processing where [[sensor node]]s are assumed to be unsecured with limited available energy, while the base station is assumed to be secure with unlimited available energy. Aggregation complicates the already existing security challenges for wireless sensor networks<ref name="refSAWN">{{cite journal|last=Hu|first=Lingxuan|author2=David Evans |title=Secure aggregation for wireless networks|journal=Workshop on Security and Assurance in Ad Hoc Networks|date=January 2003}}</ref> and requires new security techniques tailored specifically for these scenarios. Providing security to aggregate data in wireless sensor networks is known as ''secure data aggregation in WSN''.<ref name="refESPDA" /><ref name="refSAWN" /><ref name="refSIA">{{cite book|last=Przydatek|first=Bartosz|author2=Dawn Song |author3=Adrian Perrig |title=Proceedings of the 1st international conference on Embedded networked sensor systems |chapter=SIA: Secure information aggregation in sensor networks|year=2003|pages=255β265|doi=10.1145/958491.958521|isbn=978-1-58113-707-1|s2cid=239370}}</ref> were the first few works discussing techniques for secure Β data aggregation in wireless sensor networks. Two main security challenges in secure data aggregation are confidentiality and integrity of data. While [[encryption]] is traditionally used to provide end to end confidentiality in wireless sensor network, the aggregators in a secure data aggregation scenario need to decrypt the encrypted data to perform aggregation. This exposes the plaintext at the aggregators, making the data vulnerable to attacks from an adversary. Similarly an aggregator can inject false data into the aggregate and make the base station accept false data. Thus, while data aggregation improves energy efficiency of a network, it complicates the existing security challenges.<ref name=refSDA>{{cite book|last=Kumar|first=Vimal|author2=Sanjay K. Madria |title=2012 IEEE 13th International Conference on Mobile Data Management|chapter=Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis|date=August 2012 |pages=196β201|doi=10.1109/MDM.2012.49|isbn=978-1-4673-1796-2|s2cid=2990744}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)