High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks

CX Liu, Y Liu, ZJ Zhang… - International Journal of …, 2013 - Wiley Online Library
… In this section, the HEEPP scheme for secure data aggregation is described in detail. The
HEEPP scheme consists of six steps: (1) aggregation tree formation; (2) slicing; (3) encryption, …

Secure data aggregation in wireless sensor networks: A comprehensive overview

S Ozdemir, Y Xiao - Computer Networks, 2009 - Elsevier
networks. In this section, a broad overview of secure data aggregation is given by evaluating
each protocol based on the security requirements of wireless sensor networks. Section 5 …

An energy-efficient and scalable secure data aggregation for wireless sensor networks

T Wang, X Qin, L Liu - … of Distributed Sensor Networks, 2013 - journals.sagepub.com
… In Section 2, we overview some related works on secure data aggregation. Section 3
introduces the network model and design goals. In Section 4, we give the detailed descriptions of …

Secure data aggregation in wireless sensor network: a survey

H Al Zaid, E Foo, J Gonzalez Nieto - … Information Security …, 2008 - eprints.qut.edu.au
… in a remote or hostile environment where sensors are prone to node failures and … in securing
data aggregation in the WSN. With this in mind, the security issues in data aggregation for …

Secure data aggregation in wireless sensor networks: A survey

Y Sang, H Shen, Y Inoguchi, Y Tan… - … Conference on Parallel …, 2006 - ieeexplore.ieee.org
… We survey the related work for secure data aggregation in WSN … data aggregation. For
every case, we summarize the proposed techniques for protecting data confidentiality and data

Secure data aggregation in wireless sensor networks

S Roy, M Conti, S Setia… - … Forensics and Security, 2012 - ieeexplore.ieee.org
… However, most of the existing in-network data aggregation algorithms have no provisions for
security… The first attack-resilient hierarchical data aggregation protocol was designed in [16]. …

Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks

H Li, K Lin, K Li - Computer Communications, 2011 - Elsevier
data security. And privacy concern is one of the major obstacles to apply the wireless sensor
network … the defence of eavesdropping to protect data privacy in wireless sensor networks. …

SecureDAV: A secure data aggregation and verification protocol for sensor networks

A Mahimkar, TS Rappaport - IEEE Global Telecommunications …, 2004 - ieeexplore.ieee.org
… In this paper, we address the problem of how to enable secure data aggregation and … of
security. This makes ECC ideal for constrained environments such as wireless sensor networks. …

Survey on secure data aggregation for wireless sensor networks

J Guo, X Chen - … of 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
… The secure data aggregation requirements and mechanisms are described in Section III. In
… of secure data aggregation protocols first. Then we categorize the secure data aggregation

Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks

M Rezvani, A Ignjatovic, E Bertino… - … Dependable and Secure …, 2014 - ieeexplore.ieee.org
… There are three bodies of work related to our research: IF algorithms, trust and reputation
systems for WSNs, and secure data aggregation with compromised node detection in WSNs. …