Abstract

Wireless Sensor Networks (WSN) consists of a set of small and resources-constrained devices. They have received much attention over the last few years for the study and development of a plethora of potential applications. However, the common denominator of all applications of these sensor networks is the vulnerability of micro-sensors because of their limited material resources the most constraining of which is energy. In fact, wireless sensors are limited in terms of calculation, storage, battery, etc. Therefore, every possible solution that aims to conserve these resources is extensively sought. Thus, a great deal of researches has been conducted leading to an effective technique answering the established problem. This solution concerns the aggregation of data which is one of the techniques that is actually considered as an essential paradigm for sensor networks since it tends to save computation and communication resources. Data aggregation allows in-network processing which leads to lesser packet transmissions and reduces redundancy, and therefore, helps in increasing network’s overall lifetime. However, sensor networks are usually deployed in unattended and hostile environments.Thus, the designer should not only consider the limited resources of the sensor nodes but also the security threats that can occur in an easily accessible network to the attacker. In this paper, we will give an overview study of the existing data aggregation solutions in wireless sensor networks then, we will propose a new efficient and secure approach to aggregation which can be evaluated with specific criteria.

Highlights

  • Since their inception, wireless telecommunications networks have been increasingly successful in industrial and scientific communities because of its many practical advantages: ease of deployment, ubiquity of information, and low installation costs

  • They differ in their fields of application Unlike MANET networks, which have so far been modest in their success, wireless sensor networks have been successful in attracting large numbers of users and large companies such as IBM, Sun, Intel and Philips given their realism, their concrete contribution as well as the flexibility offered by their method of use

  • We will analyze the security of our SPEEDA protocol by focusing on security services that any secure aggregation scheme must satisfy and on its resistance to attacks on data aggregation

Read more

Summary

Introduction

Wireless telecommunications networks have been increasingly successful in industrial and scientific communities because of its many practical advantages: ease of deployment, ubiquity of information, and low installation costs. These offer a lot of advantages and one of them promises to revolutionize our life, our work and our way of interacting with the physical environment around us: it would be wireless sensor networks (WSN) These are ad hoc networks usually composed of a large number of communicating nodes and distributed over a given area in order to convey information to treatment points (e.g. Figure 1). Ensuring the security of aggregation is a big challenge This observation motivates us to study, the security of data aggregation in WSN in existing solutions in order to bring out their limits and propose, a new secure algorithm that can guarantee an optimal level of security and a better energy consumption for a better longevity of the network

Evaluation of existing solutions of data aggregation
Jadia and Mathuria Scheme
Hu and Evans Scheme
2.10. Ozdemir Scheme
SPEEDA: secure protocol and energy efficient for data aggregation
Description of the SPEEDA proposed scheme
Details of the proposed scheme
The SPEEDA initial phase
SPEEDA data aggregation process
SPEEDA data transmission phase
SPEEDA Insured security services
SPEEDA resistance against attacks

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.