2012 2nd National Conference on Computational Intelligence and Signal Processing (CISP) 2012
DOI: 10.1109/nccisp.2012.6189671
|View full text |Cite
|
Sign up to set email alerts
|

Secure and energy-efficient data aggregation in Wireless Sensor Networks

Abstract: Abstract-Data aggregation in intermediate nodes (called aggregator nodes)is an effective approach for optimizing consumption of scarce resources like bandwidth and energy in Wireless Sensor Networks (WSNs). However, in-network processing poses a problem for the privacy of the sensor data since individual data of sensor nodes need to be known to the aggregator node before the aggregation process can be carried out.In applications of WSNs, privacy-preserving data aggregation has become an important requirement d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 24 publications
(35 reference statements)
0
2
0
Order By: Relevance
“…The objective is to maximizing both network security and lifetime subject to the energy constraints [4][5] [6][7] [8]. As a summary, a three-phase disjoint routing scheme called the Security and Energy-efficient Disjoint Route (SEDR) was proposed.…”
Section: Related Workmentioning
confidence: 99%
“…The objective is to maximizing both network security and lifetime subject to the energy constraints [4][5] [6][7] [8]. As a summary, a three-phase disjoint routing scheme called the Security and Energy-efficient Disjoint Route (SEDR) was proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Sen [16] proposed a secure and energy-efficient data aggregation in WSNs. The vulnerabilities in existing cluster-based private data aggregation (CPDA) protocol is analysed and an enhancement has been made to execute it efficiently against vulnerability and also to make it computationally more efficient.…”
Section: Literature Reviewmentioning
confidence: 99%