Secure Data Aggregation Schemes in WSN: A Survey

International Journal of Computer & Organization Trends (IJCOT)          
© 2013 by IJCOT Journal
Volume- 3 Issue- 6                           
Year of Publication : 2013
Authors :P.Manimala , R.Senthamil Selvi


P.Manimala , R.Senthamil Selvi . "Secure Data Aggregation Schemes in WSN: A Survey " . International Journal of Computer & organization Trends (IJCOT), V3(6):15-19 Nov - Dec 2013, ISSN 2249-2593, Published by Seventh Sense Research Group.

Abstract—A wireless sensor network consists of a large number of nodes and each nodes has a limited amount of energy, memory, processing and communication capabilities. It consumes much energy for transmission than any other process. In order to reduce the energy consumption we need to reduce the number of transmission and packet size. Data aggregation is the main techniques used to reduce the power consumption and to increase the lifetime of the intermediate network. Nodes should aggregate results from individual sensors instead of being sent directly to the sink. Here we study the different techniques used for aggregation. We also highlight the advantages and issues of each aggregation technique. In addition, we study some methods to secure the aggregated data by treating confidentiality, integrity and authentication issues.


[1] L. Hu and D. Evans, “Secure Aggregation for Wireless Networks,” Proc. Symp. Applications and the Internet Workshops, pp. 384-391,2003.
[2] A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks (SDAP)(Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao, “SDAP: a secure hop-by-hop data aggregation protocol for sensor networks”. In MobiHoc ’06: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing.).
[3] Secure Hierarchical In-Network Aggregation in Sensor Networks (SHDA) (Haowen Chan, Adrian Perrig and Dawn Song “A Secure Hierarchical In-network Aggrega-tion in Sensor Networks”. In CCS 2006).
[4] Secure Hierarchical Aggregation in Sensor Networks (SHA) (Julia Albath and Sanjay Madria, “Secure Hierarchical Aggregation in Sensor Networks,”. In Proceedings of IEEE Wireless Communications and Networking conference, 2009
[5] H.O. Sanli, “Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks,” Computer Comm., vol. 29, no. 4, pp. 446-455, 2006.
[6] B. Przydatek, D. Song, and A. Perrig ”SIA:Secure Information Aggregationin Sensor Networks”, Proc. of SenSys’03, Nov 5-7, 2003, LosAngeles, CA
[7] H. Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-based Data Aggregation Protocol for Wireless Sensor Networks,” Proc. IEEE 60th Vehicular Technology Conf. (VTC ’04- Fall), vol. 7, 2004.
[8] RCDA: Recoverable Concealed Data Aggregation for Data Integrity in WirelessSensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun.
[9] J. Girao, D. Westhoff, M. Schneider, N. Ltd, and G. Heidelberg, “CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’05), vol. 5, 2005.
[10] CDAMA: Concealed Data Aggregation Scheme for Multiple Applications In Wireless Sensor Networks Yue-Hsun Lin, Shih-Ying Chang, and Hung-Min Sun
[11] A. Perrig, J. Stankovic, and D. Wagner, “Security in Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.
[12] D. Boneh, E. Goh, and K. Nissim, “Evaluating 2-DNF Formulas on Ciphertexts,” Proc. Second Int’l Conf. Theory ofCryptography (TCC), vol. 3378, pp. 325-341, 2005.
[13] D. Westhoff, J. Girao, and M. Acharya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
[14] Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks Kyung Tae Kim and Hee Yong YounSchool of Information and Communications Engineering, Sungkyunkwan University, Suwon, Korea.

Keywords— Data aggregation,wireless sensor network, Cluster head, Aggregator.