Security analysis of secure data aggregation protocols in wireless sensor networks
Title | Security analysis of secure data aggregation protocols in wireless sensor networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Rahayu, T.M., Sang-Gon Lee, Hoon-Jae Lee |
Conference Name | Advanced Communication Technology (ICACT), 2014 16th International Conference on |
Date Published | Feb |
Keywords | authentication, cluster-based WSN, cryptography, Data aggregation protocol, deep security analysis, Energy efficiency, energy-efficient and secure pattern-based data aggregation protocol, ESPDA, ESPDA protocol, Peer-to-peer computing, Protocols, secure data aggregation protocol, secure reference-based data aggregation protocol, SRDA, SRDA protocol, telecommunication security, wireless sensor network lifetime, Wireless sensor networks, WSN, WSN lifetime |
Abstract | In order to conserve wireless sensor network (WSN) lifetime, data aggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secure approaches is to make sure that the aggregators aggregate the data in appropriate and secure way. In this paper we give the description of ESPDA (Energy-efficient and Secure Pattern-based Data Aggregation) and SRDA (Secure Reference-Based Data Aggregation) protocol that work on cluster-based WSN and the deep security analysis that are different from the previously presented one. |
DOI | 10.1109/ICACT.2014.6779005 |
Citation Key | 6779005 |
- Protocols
- WSN lifetime
- WSN
- wireless sensor networks
- wireless sensor network lifetime
- telecommunication security
- SRDA protocol
- SRDA
- secure reference-based data aggregation protocol
- secure data aggregation protocol
- authentication
- Peer-to-peer computing
- ESPDA protocol
- ESPDA
- energy-efficient and secure pattern-based data aggregation protocol
- Energy Efficiency
- deep security analysis
- Data aggregation protocol
- Cryptography
- cluster-based WSN