An Investigation Of Secure And Energy Efficient Data Aggregation In Wireless Sensor Networks
Zehra Karapinar Senturk, Arafat Senturk, Resul Kara
Index Terms: Data aggregation, security, attacks, energy efficiency.
Abstract: The most energy consuming operation in a wireless sensor network is data transmission. The bigger data to be transmitted, the more energy is consumed. Therefore, minimizing the amount of data to be transferred is very important. Data aggregation appears at this point. Summary of the data of a group of node is transmitted to sink or another node instead of sending all data. Since data aggregation is that much important, it is usual to see some counter attacks to overshadow the network process. Also, it is natural to see some studies to increase the efficiency of data aggregation process in the literature. In this paper, we give an overview about recent secure and energy efficient data aggregation studies. We also referred attack types faced in wireless sensor networks and give some recommendations to cope with them.
 Y.M.Huang, M.Y.Hsieh, H.C.Chao, S.H.Hung, and J.H. Park, “Pervasive, secure access to a hierarchical-based health care monitoring architecture in wireless heterogeneous sensor networks”, IEEE Journal on Selected Areas of Communications, vol 4, pp. 400-411, 2009.
 H.T. Kung and D. Vlah, “Efficient Location Tracking Using Sensor Networks”, presented at Proceedings of 2003 IEEE Wireless Communications and Networking Conference (WCNC), 2003, 2003 IEEE. Vol. 3. IEEE, 2003.
 H. Guangjie, J. Jiang, L. Shu, J. Niu, and H.C. Chao, “Management and applications of trust in Wireless Sensor Networks: A survey, ”Journal of Computer and System Sciences”, vol. 80, pp. 602-617, May 2014.
 G.P. Gupta, M. Misra, and K. Garg, “Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks”, Journal of Network and Computer Applications”, vol. 41, pp. 300-311, May 2014.
 S. Niu, C.Wang, Z. Yu, S. Cao, “Lossy data aggregation integrity scheme in wireless sensor networks”, Computers & Electrical Engineering, vol. 39, pp. 1726-1735, August 2013.
 B. Stelte and A. Matheus, “Secure Trust Reputation with Multi-Criteria Decision Making for Wireless Sensor Networks Data Aggregation”, presented at Sensors, 2011 IEEE, Limerick, Oct. 28-31 2011, Paper 920 – 923.
 S. Ozdemir and H. Cam, “Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks”, IEEE/ACM Transaction on Networking”, vol. 18, pp. 736, 749, June 2010.
 S. Ozdemir, “Secure data aggregation in wireless sensor networks via homomorphic encryption”, Journal of the Faculty of Engineering and Architecture of Gazi University, vol. 23, pp. 365-373, 2008.
 S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive overview”, Computer Networks”, vol. 53, pp. 2022-2037, August 2009.
 B. Przdatek, D. Song, and A. Perring, “SIA: secure information aggregation in sensor networks”, Proceeding of the First International Conference on Embedded Networked Sensor Systems, November 2003.
 W. Du, J, Deng, Y. Han, and P. K. Varshney, “A witness-based approach for data fusion assurance in wireless sensor networks”, Proceeding of the IEEE Global Telekominications Conference, 2003.
 H. Li, K. Li, W. Qu, and I. Stojmenovic, “Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks”, Future Generation Computer Systems, vol. 37, pp. 108-116, 2014.
 Y. Zhao, Y. Zhang, Z. Qin, and T. Znati, “A co-commitment based secure data collection scheme for tiered wireless sensor networks”, Journal of System Architecture, vol. 57, pp. 655-662, June 2011.
 H. Li, K. Lin, and K. Li, “Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks”, Computer Communications, vol. 34, pp. 591-597, April 2011.
 H. Ceng, H. Wun, X. Zhou, and C.Gao, “Agent-based trust model in wireless sensor networks”, 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel / Distributed Computing, pp. 119-124, 2007.
 Z. Yao, D. Kim, and y. Doh, “PLUS: Parameterized and localized trust management scheme for sensor network security”, IEEE International Conference on Mobile ad-hoc and Sensor System, MASS, pp. 437-446, 2008.
 R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviours and D-S evidence theory”, Sensors, vol. 11, pp. 1345-1360, 2011
 H. Chen, “Task-based trust management for wireless sensor networks”, International Journal of Security and its Applications 3, vol. 2, pp. 21-26, 2009.