Cart (Loading....) | Create Account
Close category search window
 

A comparison of secure data aggregation schemes for wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Boppana, R.V. ; Comput. Sci. Dept., Univ. of Texas at San Antonio, San Antonio, TX, USA ; Pengjun Pan

Several secure data aggregation (SDA) schemes are proposed in literature to reduce energy consumption for cryptographic operations and minimize their impact on the sensor network lifetime. Comparisons of SDA schemes focus primarily on the number of cryptographic operations used and number of bits transmitted in a given scenario. In reality, however, a sensor node operation is more complex: significant frame level overhead compared to data payload, sporadic communication, unreliable wireless links owing to radio interference from environment and competing transmissions by other sensor nodes, non-negligible energy consumption during sleep or power down mode, and overhead due to clock drift compensation. In this paper, we evaluate two representative SDA schemes in a more realistic setting by taking these other issues into account. We used TOSSIM simulator for our analyses, but validate our implementation of data aggregation techniques and simulation results using an analytical model. Our results show that, it is more crucial to reduce the number of packets transmitted than the overall number of bits transmitted. With low duty cycles and low probability of sensor data generation, even simple concatenation of sensor data, which reduces mostly the number of packets transmitted, is nearly as effective as the more sophisticated SDA schemes; when sensor data are generated more frequently, SDA schemes that do not require intermediate nodes to decrypt sensor data give 10% higher network lifetime.

Published in:

High Performance Computing (HiPC), 2009 International Conference on

Date of Conference:

16-19 Dec. 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.