Abstract

Recent advances in wireless sensor networks ( WSNs) have inspired various new applications, including target tracking and monitoring of ecosystems. Nevertheless, a large amount of data energy consumption of WSNs is utilized by data communication. However, data aggregation techniques can eliminate redundant data being transferred back to the base station and thereby lessening the consumption of energy. Security features like data integrity, confidentiality and accumulation of latest data is of great importance if WSN is utilized in extremely hostile or remote settings whereby the sensors are vulnerable to node failure and breach. Currently, there is prospect for securing data aggregation using WSN. In light of this, security features in data aggregation using WSN will be examined in current study. Next, the adversarial model that can be used in any aggregation scheme is then evaluated. Moreover, the latest and most sophisticated secured data aggregation scheme, proposed will be examined and categorized into two groups which are classified according to the number of aggregator nodes and the existence of the verification term. In this paper, created a table that showed the advantages and limitations of each algorithm that was adopted by researchers, shown in Table 3. Last, a computational approach is recommended to build a modern design with minimal protection preconditions against various types of challenges. The conceptual framework aims to provide an advanced understanding and enable the process of evaluation.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call