2014
DOI: 10.5815/ijitcs.2014.05.04
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey

Abstract: The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained WSNs. Concealed Data Aggregation (CDA) based on privacy homomorphism (PH) gives a critical solution for energy efficien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…ie. E(x+y) =E(x) +E(y).It is more suitable in wireless sensor network due to their less expensive operation than multiplicative PH [12].…”
Section: Proposed Schemementioning
confidence: 99%
See 3 more Smart Citations
“…ie. E(x+y) =E(x) +E(y).It is more suitable in wireless sensor network due to their less expensive operation than multiplicative PH [12].…”
Section: Proposed Schemementioning
confidence: 99%
“…Privacy homomorphic encryption achieves both end to end confidentiality and data aggregation. Additive PH and multiplicative PH are the two variations of privacy homomorphism [12].…”
Section: Proposed Schemementioning
confidence: 99%
See 2 more Smart Citations
“…Lai et al [14] use the greedy graph coloring technique is used to assign time slots to the sender to overcome the frequency interference problem in convergecast routing and find the shortest path to send data to the sink node so that throughput should increased. [16] Defines the security in data aggregation technique, concealed data aggregation in convergecast routing in wsn improves the security with energy efficiency in aggregation.…”
Section: Related Workmentioning
confidence: 99%