IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
DOI: 10.1109/vetecf.2004.1404972
|View full text |Cite
|
Sign up to set email alerts
|

SRDA: secure reference-based data aggregation protocol for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 65 publications
(35 citation statements)
references
References 15 publications
0
35
0
Order By: Relevance
“…Firstly raw packets are transmitted to the cluster head reporting to higher head cluster. [11] The higher cluster head then generates reference entry for the node that has transmitted the raw sensed packets. Cluster head removes the reference entry when the session ends.…”
Section: Hop-by-hop Aggregation Protocolsmentioning
confidence: 99%
“…Firstly raw packets are transmitted to the cluster head reporting to higher head cluster. [11] The higher cluster head then generates reference entry for the node that has transmitted the raw sensed packets. Cluster head removes the reference entry when the session ends.…”
Section: Hop-by-hop Aggregation Protocolsmentioning
confidence: 99%
“…In SRDA (Secure Reference-Based Data Aggregation) [18], sensor nodes send differential data instead of raw data by comparing raw data with reference data, thus reducing the number of bits transmitted from sensor node to CH, which improves the energy. SRDA uses an algorithm with security margin as adjustable parameter; it is calculated based on the number of hops from the BS.…”
Section: Srdamentioning
confidence: 99%
“…Hop-by-hop encryption is usually based on symmetric key schemes, which demand less computing resources than asymmetric key ones. These algorithms, such as [4,5,44,45,46,47,48,49,50], require each aggregator to decrypt every message it receives to allow in-network processing, thus causing a confidentiality breach. Furthermore, applying several consecutive encryption/decryption operations can negatively impair latencies.…”
Section: Related Workmentioning
confidence: 99%