International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013


Secure Data Aggregation in Wireless Sensor Networks: A Survey

Patel Swapnil


Abstract: Recent advances in wireless sensor networks (WSNs) have led to many new applications including habitat monitoring and target tracking. Sensor nodes spend most of their energy during data transmission. With data aggregation, one can eliminate the redundant data transmission and so reduce the energy consumption. Sensor nodes are deployed in a very remote or hostile environment. They are often compromise. So security issues such as confidentiality, integrity, authentication and availability becomes crucial. There is currently research potential in securing data aggregation in the WSN. In this paper, we have presented existing secure data aggregation methods with advantages and disadvantages.


Keywords: security, aggregation, wireless sensor network, sensor node, energy consumption


Edition: Volume 2 Issue 1, January 2013,


Pages: 553 - 557


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Patel Swapnil, "Secure Data Aggregation in Wireless Sensor Networks: A Survey", International Journal of Science and Research (IJSR), Volume 2 Issue 1, January 2013, pp. 553-557, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013315

Similar Articles with Keyword 'security'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top