International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128 | Views: 190

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015


An Approach for Improving Security and Efficient Data Aggregation in Wireless Sensor Network

Anil A Kumbar | Sagarika [7]


Abstract: Sensor networks are collection of sensor nodes which co-operatively send sensed data to the sink (receiver). As sensor nodes battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, so amount of data should be reduced and send it to the base station. The aim of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Wireless sensor networks (WSN) offer an increasingly Sensor nodes need less power for processing as compared to transmitting data. It is mainly deployed in hostile environments, so security is needed. The sensor networks are used in civilian areas, including environment and habitat monitoring, traffic control, home and industrial automation, healthcare application, accident reporting and in security applications such as in military applications. Our main aim is to provide a secure data aggregation scheme which guarantees the privacy, authenticity and freshness of individual sensed data as well as the accuracy and confidentiality of the aggregated data without introducing a significant overhead on the battery limited sensors.


Keywords: Wireless Sensor Networks, Data Privacy, Data confidentiality, Message authentication, End to end encrypted data aggregation, Privacy homomorphism, Accuracy, Data aggregation, Hop by hop encrypted data aggregation, Data freshness


Edition: Volume 4 Issue 6, June 2015,


Pages: 443 - 448


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top