Open Access Open Access  Restricted Access Subscription or Fee Access

A Review on Data Aggregation in Wireless Sensor Networks

V.C. Rudramurthy, R. Aparna

Abstract


Wireless Sensor Network is a recent advanced technology of computer networks and electronics. Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. Wireless sensor networks are used in many applications in military, ecological and health-related areas. These networks are likely to be composed of hundreds and potentially thousands of tiny sensor nodes, functioning autonomously and in many cases, without access to renewable energy resource. These networks are constrained with energy, memory and computing. Power enhance efficient techniques are needed for data aggregation, data collection, query processing, decision making and routing in sensor Networks. Data aggregation is very crucial technique in wireless sensor network. Because with the help of data aggregation we reduce the energy consumption by eliminating redundancy. The security issues like data confidentiality and integrity in data aggregation become vital when the sensor network is deployed in a hostile environment. Most of the aggregation algorithms and schemes do not include any provisions for protection, and consequently these systems are defenseless to a broad diversity of approaches. In the wireless sensor network most challenging task is a life time, so with help of data aggregation we can enhance the lifetime of the network


Keywords


Wireless Sensor Networks, Data Aggregation, Security

Full Text:

PDF

References


H.Alzaid, E.Foo, J.G.Nieto "Secure Data Aggregation in Wireless Sensor Network: a survey", Information Security Conference (ACSC2008), Wollongong, Australia, January 2008.

Akyildiz, I.F. Weilian Su Sankarasubramaniam, Y. Cayirci, E. Georgia , ”A survey on sensor networks“, IEEE communication magazine, Vol.30,No.8,pp. 102 – 114, 2002.

D. Estrin, R. Govindan, J. Heidemann, S. Kumar, “Next century challenges: scalable coordination in sensor networks”, ACM MobiCom’99, Washingtion, USA, 1999, pp. 263–270.

Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”, Volume 02, Issue 01, Manuscript Code: 110746, IJCIT, 2011.

Yong Wang, Garhan Attebury, and Byrav Ramamurthy, ”A Survey Of Security Issues In Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, Volume 8, No. 2, 2nd Quarter 2006.

Idrees S. Kocher, Chee-Onn Chow, Hiroshi Ishii, and Tanveer A. Zia, “Threat Models and Security Issues In Wireless Sensor Networks”, International Journal Of Computer Theory And Engineering, Vol. 5, No. 5, October 2013.

Idrees S. Kocher, Chee-Onn Chow, Hiroshi Ishii, and Tanveer A. Zia, “Threat Models and Security Issues In Wireless Sensor Networks”, International Journal Of Computer Theory And Engineering, Vol. 5, No. 5, October 2013.

Jyoti Shukla, Babli Kumari, “Security Threats and Defense Approaches In Wireless Sensor Networks: An Overview”, International Journal of Application Or Innovation In Engineering & Management (IJAIEM), Volume 2, Issue 3, March 2013.

P.K.Shah, K.V.Shukla,"Secure Data aggregation Issues in Wireless Sensor Network: A Survey", Journal of Information and Communication Technologies, Vol.22, Issue 1, JAN 2012.

E. Fasolo, M. Rossi, 1 Widmer, and M. Zorzi, "In-network aggregation techniques for wireless sensor networks: a survey," IEEE Wireless Communications [see also IEEE Personal Communications], vol. 14, no. 2, pp. 70-87, 2007.

S. Chattetjea and P. Havinga, "A dynamic data aggregation scheme for wireless sensor networks," in Proceedings of the Program for Research on Integrated Systems and Circuits, Veldhoven, The Netherlands, 2003.

Kiran Maraiya, Kamal Kant, Nitin Gupta, “Wireless Sensor Network: A Review on Data Aggregation”, International Journal of Scientific & Engineering Research, Volume 2, Issue 4, April -2011.

B. Krishnamachari, D. Estrin, S. Wicker, “The impact of data aggregation in wireless sensor networks”, Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, 2002, pp. 575–578

Hani Alzaid Ernest Foo Juan Gonzalez Nieto,” Secure Data Aggregation in Wireless Sensor Network: a survey”, Conferences in Research and Practice in Information Technology (CRPIT), Vol. 81, January 2008.

O. Younis, S. Fahmy, “HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks”, IEEE Trans. Mobile Comput. 3 (4) (2004) 366–379.

Patel Swapnil, “Secure Data Aggregation in Wireless Sensor Networks: A Survey”, International Journal of Science and Research (IJSR), Volume 2 Issue 1, January 2013, India Online ISSN: 2319-7064

Thejaswi V, Harish H.K, “Secure Data Aggregation Techniques in Wireless Sensor Network”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.3, Special Issue 5, May 2015.

H. AJzaid, E. Foo, and 1 G. Nieto, "Secure data aggregation in wireless sensor network: a survey," in AISC '08: Proceedings of the sixth Australasian conference on Information security. Darlinghurst, Australia: Australian Computer Society, Inc., 2008, pp. 93-105.

H. Guangjie, J. Jiang, L. Shu, J. Niu, and H.C. Chao, “Management and applications of trust in Wireless Sensor Networks: A survey”, Journal of Computer and System Sciences, vol. 80, pp. 602-617, May 2014.

J.Rajput and N.Garg,"A Survey on Secure Data Aggregation in Wireless Sensor Network”, International Journal of Advanced Research in Computer Science and Software Engineering, May 2014, Volume 4, Issue.

Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia, “Secure Data Aggregation in Wireless Sensor Networks”, IEEE transactions on information forensics and security, VOL. 7, NO. 3, JUNE 2012.

Vimal Pambhar, Bhoomi Bangoria, Bhavik Kataria, “A Framework: Secure Data Aggregation in Wireless Sensor Networks”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 7, July 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.