Data aggregation in wireless sensor networks: from the perspective of security

X Liu, J Yu, F Li, W Lv, Y Wang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSNs) are usually deployed in an unattended even
hostile environment. What is worse, these nodes are equipped with limited battery, storage …

Security and application of wireless sensor network

Z Huanan, X Suping, W Jiannan - Procedia Computer Science, 2021 - Elsevier
At present, wireless sensor networks are developing rapidly with the support of the Internet
of things. Wireless sensor networks can deliver the information people need at any time, free …

Verifiable, secure mobile agent migration in healthcare systems using a polynomial-based threshold secret sharing scheme with a blowfish algorithm

P Kumar, K Banerjee, N Singhal, A Kumar, S Rani… - Sensors, 2022 - mdpi.com
A mobile agent is a software application that moves naturally among hosts in a uniform and
non-uniform environment; it starts with one host and then moves onto the next in order to …

Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks

J Cui, L Shao, H Zhong, Y Xu, L Liu - Peer-to-Peer Networking and …, 2018 - Springer
In wireless sensor networks, data aggregation allows in-network processing, which leads to
reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the …

Post quantum security solution for data aggregation in wireless sensor networks

AA Agarkar, M Karyakarte… - 2020 IEEE wireless …, 2020 - ieeexplore.ieee.org
Data aggregation has been one of the most widely researched topics for Wireless Sensor
Network (WSN) as it helps in increasing the effective life time of the network and reduces the …

Data validation and integrity verification for trust based data aggregation protocol in WSN

SE Roslin - Microprocessors and Microsystems, 2021 - Elsevier
Abstract In Wireless Sensor Networks, during data fragmentation, there are chances for
dropping some blocks and injecting forged data by the attackers. So the integrity of these …

[PDF][PDF] Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network.

W Fang, W Zhang, QQ Zhao, X Ji… - … , Materials & Continua, 2019 - cdn.techscience.cn
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or
unattended environment, the privacy security of data aggregation is facing more and more …

Wireless sensor networks security: State of the art

M Al-Rakhami, S Almowuena - arXiv preprint arXiv:1808.05272, 2018 - arxiv.org
Wireless sensor networks (WSNs) have become one of the main research topics in
computer science in recent years, primarily owing to the significant challenges imposed by …

Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues

H Hayouni, M Hamdi - 2016 IEEE 13th international conference …, 2016 - ieeexplore.ieee.org
In wireless sensor networks, data aggregation plays an important role in energy
conservation of sensors. However, these networks are typically deployed in hostile …

[PDF][PDF] Secure data aggregation in wireless sensor network using Chinese remainder theorem

S Thomas, T Mathew - International Journal of Electronics and …, 2022 - journals.pan.pl
Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the
popular Chinese Remainder theorem. Here, an 'Augmented Chinese Remainder System'is …