Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
… In this paper, we introduce some secure data aggregation schemes in wireless sensor
networks … process can be implemented without compromising security. Simultaneous access to …

Review on secure data aggregation in Wireless Sensor Networks

MS Abood, H Wang, HF Mahdi… - IOP Conference …, 2021 - iopscience.iop.org
… environment then the nodes can be made compromised by attacks, where will … aggregation
in wireless sensor network. In WSNs, will discuss expected attacks which threaten secure DA …

Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks

K Shah, D Jinwala - Frontiers of Computer Science, 2021 - Springer
… Privacy and integrity of data in linear WSNs is significant as compromising the same yields
adverse effects. Therefore, we propose a lightweight secure data aggregation scheme for …

Light-weight secure aggregated data sharing in IoT-enabled wireless sensor networks

G Said, A Ghani, A Ullah, M Azeem, M Bilal… - IEEE …, 2022 - ieeexplore.ieee.org
… a secure data aggregation and transmission model for IoTenabled wireless sensor networks
Thus, in both cases SATS provide less number of compromised bytes and compromised

Security in wireless sensor networks: Issues and challenges

M Teymourzadeh, R Vahed, S Alibeygi… - arXiv preprint arXiv …, 2020 - arxiv.org
… , secure data aggregation is attainable; however the restrictions in wireless sensor networks
… It is worthwhile to have awareness of compromised nodes and attacks similar to any network

Energy efficient aggregation technique‐based realisable secure aware routing protocol for wireless sensor network

A Raja Basha - IET Wireless Sensor Systems, 2020 - Wiley Online Library
… named as wireless sensor network (WSN), this sensor network is … confidential operations
because its security in data transmission … and having their compromised security. The ability of …

Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol

S Gomathi, C Gopala Krishnan - Wireless Personal Communications, 2020 - Springer
… data aggregation is that the data may be passed on malicious node. All the existing data
aggregation techniques undergo security … a protocol named Secure Data Aggregation Protocol (…

Wireless sensor networks (WSNs): Security and privacy issues and solutions

OO Olakanmi, A Dada - Wireless mesh networks-security …, 2020 - books.google.com
… support aggregation and multi-hop in order to reduce the traffics and extend the life span of
the … to the key compromise. That is, a compromised sensor node will not only compromise the …

Post quantum security solution for data aggregation in wireless sensor networks

AA Agarkar, M Karyakarte… - … and networking …, 2020 - ieeexplore.ieee.org
compromisedsensor nodes’ data. Parmar and Jinwala [6] introduced symmetric-key based
homomorphic primitives for end-to-end secure data aggregation in wireless sensor networks

Secure data collection for wireless sensor network

S Ifzarne, I Hafidi, N Idrissi - Emerging Trends in ICT for Sustainable …, 2021 - Springer
aggregation at a secure routing path. The first technique attains security and data aggregation
… Even if an inside attacker compromises an intermediate node to get the decryption key, …