700 research outputs found

    A Review of Privacy Preserving Techniques inWireless Sensor Network

    Get PDF
    This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in location privacy, data privacy and network privacy. This paper should provide help for further research in privacy preservation in wireless sensor network. Keywords: Context privacy, data privacy, source location privac

    A Review of Privacy Preserving Techniques in Wireless Sensor Network

    Get PDF
    This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in location privacy, data privacy and network privacy. This paper should provide help for further research in privacy preservation in wireless sensor network. Keywords: Context privacy, data privacy, source location privac

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Secure authentication and data aggregation scheme for routing packets in wireless sensor network

    Get PDF
    Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model

    iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks

    Get PDF
    Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, how to protect data privacy and data integrity are two major challenges for data aggregation in wireless sensor networks. In this paper, we present iPDA??????an integrity-protecting private data aggregation scheme. In iPDA, data privacy is achieved through data slicing and assembling technique; and data integrity is achieved through redundancy by constructing disjoint aggregation paths/trees to collect data of interests. In iPDA, the data integrity-protection and data privacy-preservation mechanisms work synergistically. We evaluate the iPDA scheme in terms of the efficacy of privacy preservation, communication overhead, and data aggregation accuracy, comparing with a typical data aggregation scheme--- TAG, where no integrity protection and privacy preservation is provided. Both theoretical analysis and simulation results show that iPDA achieves the design goals while still maintains the efficiency of data aggregation

    Energy Efficient Data Aggregation for Wireless Sesor Networks

    Get PDF
    • …
    corecore