Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing

Tejashree Borbande, Vikas Maral

Smart Mobile phones especially are getting more and more importance in day to day life. These mobile phones are now facilitated with number of applications that are using sensors such as camera, microphone, GPS, accelerometer, ambient light sensor, gyroscope, and so on. With the help of large numbers of individual participants, aggregation which is computed from data is really useful and helps to predict the statistics of Result. Aggregation guarantees more privacy of the data from individual participants. This paper provides a solution for preserving the individual participants privacy by using aggregate function like Sum, Min. Calculation of Sum aggregation is done without releasing the participants information. Min aggregation is calculated using Sum aggregation. Min aggregation is nothing but minimum value of data. In this paper, a multi-hop network is considered where, there is a main aggregator at the highest level and mobile nodes are considered at lowest level and in between node sink are used at middle level. This system deals with dynamic leaves and joins in mobile sensing using the timestamp of the participants.

Keywords: Encryption, Multi-hop network, Mobile Sensing, Data Aggregator, Privacy

Edition: Volume 4 Issue 12, December 2015

Pages: 2017 - 2020

Share this Article

How to Cite this Article?

Tejashree Borbande, Vikas Maral, "Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152431, Volume 4 Issue 12, December 2015, 2017 - 2020

118 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Similar Articles with Keyword 'Multi-hop network'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2017 - 2020

Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing

Tejashree Borbande, Vikas Maral

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 846 - 849

Comparative Analysis of AODV and DSR Routing Protocols Using OPNET 14.0

Charu Sharma, Jaspreet Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 374 - 379

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Savithru Lokanath, Aravind Thayur

Share this Article

Similar Articles with Keyword 'Mobile Sensing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2017 - 2020

Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing

Tejashree Borbande, Vikas Maral

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1356 - 1358

A Survey Paper on FriendFinder: A Lifestyle based Friend Recommender App for Smart Phone Users

Chinar Bhandari, Asst Prof. M.D Ingle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2542 - 2545

Myfriend: A User Preference Based Friend Recommendation System for Social Networks

Amrutha O, Mohammed Jaseem N

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2558 - 2561

A Survey Paper on Muti-Hop Privacy-Aware Data Aggregation in Mobile Sensing

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Similar Articles with Keyword 'Privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article
Top