21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 2007
DOI: 10.1109/ainaw.2007.316
|View full text |Cite
|
Sign up to set email alerts
|

Role Assignment for Data Aggregation in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…In addition to the CCM mode, the other three modes are parallelizable. Our proposed scheme can be also implemented in a parallel manner, which will be useful for scenarios having powerful nodes in the network, such as a multi-core base station processing many large packets resulting from data aggregation [49]. The authenticity of the ciphertext depends on the IV or the nonce in the three modes, while it depends on the IV and K for our proposed AEADS.…”
Section: Security Comparisonmentioning
confidence: 99%
“…In addition to the CCM mode, the other three modes are parallelizable. Our proposed scheme can be also implemented in a parallel manner, which will be useful for scenarios having powerful nodes in the network, such as a multi-core base station processing many large packets resulting from data aggregation [49]. The authenticity of the ciphertext depends on the IV or the nonce in the three modes, while it depends on the IV and K for our proposed AEADS.…”
Section: Security Comparisonmentioning
confidence: 99%
“…Following the works of [9] and [39], we will assume that the UAVs can be assigned to one or more of the following roles at each time interval: (i) a sensor, which observes the target/AOI (called node 0), via a sensor and produces the data which will be relayed to the base station (called node n + 1), (ii) a relay, which simply relays its own data to the next level node without any processing, or (iii) an aggregator, which receives one or more data from other nodes, then aggregates the data of the same type to produce a single data point and sends the aggregated data to the next level node. Figure 2 illustrates the information flow in an aggregation network topology.…”
Section: Uav Role Assignmentmentioning
confidence: 99%
“…This work demonstrates that the re-encryption schemes can be expensive due to some costly operations. Moreover, the proposed solutions display an important limitation: they rely entirely on symmetric (shared key) cryptography, allowing only the base station to decrypt ciphertexts and, thus, preventing the sensor nodes from employing data aggregation mechanisms [10] on the locally stored data. Although asymmetric mechanisms are known to be more resource-consuming than symmetric ones, they have the advantage of allowing sensors to decrypt the data and perform data aggregation, eliminating redundancy and, thus, minimizing the memory and transmission overheads.…”
Section: Introductionmentioning
confidence: 99%