
Review on secure data aggregation in Wireless Sensor Networks
Author(s) -
Mohammed Salah Abood,
Hua Wang,
Hussain Falih Mahdi,
Mustafa Maad Hamdi,
Ahmad S. Abdullah
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1076/1/012053
Subject(s) - data aggregator , computer science , wireless sensor network , energy consumption , news aggregator , node (physics) , computer network , base station , process (computing) , scheme (mathematics) , distributed computing , adversarial system , computer security , engineering , mathematical analysis , electrical engineering , structural engineering , mathematics , operating system , artificial intelligence
Recent advances in wireless sensor networks ( WSNs) have inspired various new applications, including target tracking and monitoring of ecosystems. Nevertheless, a large amount of data energy consumption of WSNs is utilized by data communication. However, data aggregation techniques can eliminate redundant data being transferred back to the base station and thereby lessening the consumption of energy. Security features like data integrity, confidentiality and accumulation of latest data is of great importance if WSN is utilized in extremely hostile or remote settings whereby the sensors are vulnerable to node failure and breach. Currently, there is prospect for securing data aggregation using WSN. In light of this, security features in data aggregation using WSN will be examined in current study. Next, the adversarial model that can be used in any aggregation scheme is then evaluated. Moreover, the latest and most sophisticated secured data aggregation scheme, proposed will be examined and categorized into two groups which are classified according to the number of aggregator nodes and the existence of the verification term. In this paper, created a table that showed the advantages and limitations of each algorithm that was adopted by researchers, shown in Table 3. Last, a computational approach is recommended to build a modern design with minimal protection preconditions against various types of challenges. The conceptual framework aims to provide an advanced understanding and enable the process of evaluation.