期刊文献+

Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

下载PDF
导出
摘要 As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.
出处 《Computers, Materials & Continua》 SCIE EI 2019年第8期583-599,共17页 计算机、材料和连续体(英文)
基金 partially supported by the National Natural Science Foundation of China(61571004) the Shanghai Natural Science Foundation(No.17ZR1429100) the National Science and Technology Major Project of China(No.2018ZX03001017-004) the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20170074).
  • 相关文献

参考文献3

二级参考文献10

  • 1S. Ganeriwal,M. B. Srivastava.Reputation-based Framework for High Integrity Sensor Networks. The 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks . 2004
  • 2Xiangqian Chen,Makki, K.,Kang Yen,Pissinou, N.Sensor network security: a survey. Communications Surveys & Tutorials, IEEE . 2009
  • 3Shashikala,Kavitha C.A survey on secured routing protocols for wireless sensor network. Computing Communication&Networking; Technologies,Third International Conference on . 2012
  • 4Momani M.Trust models in wireless sensor networks:a survey. Recent Trends in Network Security and Applications . 2010
  • 5Jiang J,Han G,Wang F,et al.An Efficient Distributed Trust Model for Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems (S1045-9219) . 2015
  • 6Gheorghe L,Rughinis R,Tataroiu R.Adaptive Trust Management Protocol based on intrusion detection for Wireless Sensor Networks. Networking in Education and Research,International Conference 12th Edition . 2013
  • 7Fang F,Li J,Li J.A reputation management scheme based on multi-factor in WSNs. Mechatronic Sciences,Electric Engineering and Computer,International Conference on . 2013
  • 8Tajeddine A,Kayssi A,Chehab A.CENTER:A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. Privacy,Security and Trust,Tenth Annual International Conference on . 2012
  • 9Gerrigagoitia K,Uribeetxeberria R,Zurutuza U,et al.Reputation-based Intrusion Detection System for wireless sensor networks. Complexity in Engineering . 2012
  • 10Ukil A.Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks. Computational Intelligence,Modelling and Simulation,Second International Conference on . 2010

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部