Cryptographic Vs Trust Based Secure Data Aggregation in Wireless Sensor Networks

Nabila Labraoui, Mourad Guerroui, Makhlouf Aliouat, Tanveer Zia

Research output: Book chapter/Published conference paperConference paperpeer-review

Abstract

One common technique used to reduce the amount of data in sensor networks is data aggregation. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However, securing data aggregation in WSN is made even more challenging by the fact that the sensor nodes and aggregators deployed in hostile environments are exposed to various security threats. In this paper we survey the current research related to security in data aggregation in wireless sensor networks. We have classified the security schemes studied in two main categories: cryptographic based scheme and trust based scheme. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the flaws in existing schemes.
Original languageEnglish
Title of host publicationGIIS Sustainable Communications for all Regions
EditorsFarouk Kamoun
Place of PublicationUSA
PublisherIEEE Xplore
Pages1-4
Number of pages4
ISBN (Electronic)9781424446230
Publication statusPublished - 2009
EventIEEE Global Information Infrastructure Symposium - Hammamet, Tunisia
Duration: 22 Jun 200926 Jun 2009

Conference

ConferenceIEEE Global Information Infrastructure Symposium
Period22/06/0926/06/09

Fingerprint

Dive into the research topics of 'Cryptographic Vs Trust Based Secure Data Aggregation in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this