TITLE

Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks

AUTHOR(S)
POORNIMA, A. S.; AMBERKER, B. B.
PUB. DATE
March 2013
SOURCE
Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p193
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Wireless Sensor Network (WSN) consists of a large number of nodes with limited sensing, computation and communication capabilities. In such a network the data transmission is an energy-consuming operation. Hence to increase the lifetime of the network it is essential to reduce the number of bits transmitted. One widely used method for reducing the data transmission is data aggregation. The security issues such as data integrity, confidentiality and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment. Secure data aggregation schemes are suitable to achieve security in data aggregation. In this paper we propose two protocols called SEEDA-SUM/AVG and SEEDA-MIN/MAX for secure data aggregation that provide end-to-end data privacy. The protocol SEEDA-SUM/AVG is used to compute the SUM and AVERAGE aggregates. Using this protocol the average number of bits transmitted per node is reduced by 30%-70% compared to the scheme proposed by Castelluccia et al. The SEEDA-MIN/MAX protocol computes MINIMUM and MAXIMUM aggregates by comparing the encrypted data. The protocol uses simple comparison operations in contrast to multiple encryptions in the scheme proposed by Ertaul et al.
ACCESSION #
86414693

 

Related Articles

  • T-DLRP: Detection of Fast Retransmission Losses Using TCP Timestamp for Improving the End-to-End Performance of TCP over Wireless Networks. Sreekumari, Prasanthi; Sang-Hwa Chung; Meejeong Lee; Won-Suk Kim // International Journal of Distributed Sensor Networks;2013, p1 

    Improving the end-to-end performance of TCP over wireless networks has been an active research area. When TCP operates in wireless networks, the performance of TCP degrades significantly. It is well known that frequent retransmission timeouts are the leading source of TCP performance degradation...

  • Maximum End-to-End Delay of QTNPOSS Network for Multimedia Traffic. Ke Xiong; Yu Zhang; Zhengding Qiu; Shenghui Wang; Dongmei Sun // Proceedings of the International Symposium on Information Proces;2009, p334 

    To improve the Quality of Service (QoS) ability of TNPOSS (To Next-hop Port Sequence Switch) network, this paper proposes a QoS-enhanced TNPOSS (QTNPOSS) network model by introducing Fractal Leak Bucket (FLB) shaper and Weighted Fair Queuing (WFQ) scheduler. In the proposed model, packets of...

  • Information systems frontiers editorial December 2012. Ramesh, R.; Rao, H. // Information Systems Frontiers;Nov2012, Vol. 14 Issue 5, p963 

    The article discusses various reports published within the issue, including an article on economic theory and the financial crisis, a report on end-to-end reliability of service applications, and another about routinisation of B2B E-commerce by small firms.

  • A Secure Architecture of Mobile Gaming Platform. Jiang Yongmei // International Journal of Advancements in Computing Technology;Nov2011, Vol. 3 Issue 10, p163 

    With the growth of the mobile gaming market, more and more companies and developers have joined into the troops of mobile gaming development. Mobile games have been driven by the features of the mobility of mobile devices and the increasing of the bandwidth capabilities of the wireless networks....

  • Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling? Faigl, Zolt├ín // Wireless Networks (10220038);Feb2015, Vol. 21 Issue 2, p531 

    This paper evaluates the performance overheads of two Host Identity Protocol-based signalling schemes controlling internet protocol connectivity establishment and handover procedures in distributed mobile networks. The paper proves using an analytical model that the Ultra Flat Architecture has...

  • Link Layer Correction Techniques and Impact on TCP's Performance in IEEE 802.11 Wireless Networks. Dalal, Purvang; Sarkar, Mohanchur; Dasgupta, Kankar; Kothari, Nikhil // Communications & Network;May2014, Vol. 6 Issue 2, p49 

    TCP performance degrades when end-to-end connections extend over wireless links which are characterized by high Bit Error Rate and intermittent connectivity. Such degradation is mainly accounted for TCP's unnecessary congestion control actions while attempting TCP loss recovery. Several...

  • FAULT DETECTION IN NETWORKS BASED ON DYNAMIC INTERVAL BASED ACTIVE PROBING. R., Banumathi // International Journal of Research in Computer Application & Mana;Mar2012, Vol. 2 Issue 3, p110 

    Increase in the network usage for more and more performance critical applications has caused a demand for systems that can monitor network health with minimum management overhead. Active probing is widely used to provide effective tools for end-to-end monitoring and fault diagnosis over a...

  • The End-to-end IPv6 Network Available Bandwidth Measurement and Analysis. Quan-jie Qiu; Xiao-rong Tang; Xing-fu Wang; Zhong-fu Wu // International Journal of Advancements in Computing Technology;Mar2012, Vol. 4 Issue 5, p256 

    In light of the particularities of Internet Protocol version 6 (IPv6) and based on the principles of network bandwidth measurement, an available bandwidth measuring algorithm is proposed with the characteristics of IPv6 being protocol-based, end-to-end, one-way, relative time delay,...

  • End-to-end reliability of service oriented applications. Zo, Hangjung; Nazareth, Derek; Jain, Hemant // Information Systems Frontiers;Nov2012, Vol. 14 Issue 5, p971 

    As organizations move towards adopting a service oriented architecture that permits the coexistence of multiple technology environments, an increasing number of applications will be developed through the assembly of existing software components with standard web service interfaces. These...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics