International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 273

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.3 / 10


     

A Survey on Energy Efficient Secure Data Aggregation in WSNs

Tanushree K N, Prasanna Kumar M


Abstract: Wireless Sensor Networks (WSNs) are special kind of ad-hoc networks; having abilities of sensing; processing and wireless connectivity contains hundreds or thousands of sensor nodes. Sensor nodes are usually constrained in energy; communication; storage; and computation capability. Due to the main characteristics of resource-constrained and battery-powered sensors in wireless sensor networks; energy consumption is always a major concern. WSNs usually generate large amounts of raw data in which there exists high redundancy. So; it is important to develop efficient data processing technique to reduce redundant data and the amount of transmission. Aggregation is an essential technique to reduce data redundancy and the communication overhead; also minimize the energy consumption and prolong network lifetime. Security is an important criterion to be considered because wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. So data aggregation and security are essential for WSN. In this paper we discuss the data aggregation approaches and advantages and disadvantages of data aggregation and secure data aggregation mechanisms in the network.


Keywords: Data aggregation, Encryption, Sensor nodes, Wireless Sensor Networks Energy Efficiency


Edition: Volume 3 Issue 5, May 2014


Pages: 256 - 259



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Tanushree K N, Prasanna Kumar M, "A Survey on Energy Efficient Secure Data Aggregation in WSNs", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 256-259, https://www.ijsr.net/getabstract.php?paperid=20131652, DOI: https://www.doi.org/10.21275/20131652



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article
Top