Open Access   Article Go Back

A Survey on Privacy Preserve Methods in Data Aggregation

Harsha K.M1 , Divya James2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 755-760, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.755760

Online published on Jun 30, 2019

Copyright © Harsha K.M, Divya James . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harsha K.M, Divya James, “A Survey on Privacy Preserve Methods in Data Aggregation,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.755-760, 2019.

MLA Style Citation: Harsha K.M, Divya James "A Survey on Privacy Preserve Methods in Data Aggregation." International Journal of Computer Sciences and Engineering 7.6 (2019): 755-760.

APA Style Citation: Harsha K.M, Divya James, (2019). A Survey on Privacy Preserve Methods in Data Aggregation. International Journal of Computer Sciences and Engineering, 7(6), 755-760.

BibTex Style Citation:
@article{K.M_2019,
author = {Harsha K.M, Divya James},
title = {A Survey on Privacy Preserve Methods in Data Aggregation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {755-760},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4626},
doi = {https://doi.org/10.26438/ijcse/v7i6.755760}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.755760}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4626
TI - A Survey on Privacy Preserve Methods in Data Aggregation
T2 - International Journal of Computer Sciences and Engineering
AU - Harsha K.M, Divya James
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 755-760
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
245 199 downloads 103 downloads
  
  
           

Abstract

Wireless Sensor network has improved their enhancement in enormous applications like monitoring environment, health application monitoring, military surveillance and also tracking of target that are of real time field. When there is communication between the nodes it affects the network lifetime which results in large consumption of energy. In order to reduce this energy consumption, Data aggregation techniques have been employed which eliminates the unnecessary data that is travelling from source node to sink node. When Wireless Sensor Network is deployed in a hostile environment the sensor node would be susceptible to node failures and also compromised by the adversary, thus it would become critical. There are different data aggregation approaches in wireless sensor network mainly used to increase the consumption of energy and also there are different approaches to preserve the data aggregation mainly used protect the data. It also preserves the various security issues such as data freshness, data integrity, data confidentiality in data aggregation

Key-Words / Index Term

Wireless Sensor Network, Data Aggregation, Network lifetime, Energy consumption

References

[1] Taochun Wang, Xiaolin Qin, and Liang Liu, “An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks”, International Journal of Distributed SensorNetworks, Hindawi, 2013.
[2] Shirshu Varma, Uma Shanker Tiwary, “Data Aggregation in Cluster based Wireless Sensor Networks”, Proceedings of the First International Conference on Intelligent Human Computer Interaction, Springer, 2009, pp 391-400.
[3] Priyanka B.Gaikwad, Manisha R.Dhage,”Survey on Secure Data Aggregation in Wireless Sensor Network”,Internationa lConference on Computing Communication Control and Automation,2015.
[4] Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah and Kashif Naseer Qureshi,, “Security Issues and Attacks in Wireless Sensor Network”, World Applied Sciences Journal, Volume 30, Issue 10, pp. 1224-1227,November 14.
[5] S. Madden et al., “TAG: a Tiny Aggregation Service for Adhoc Sensor Networks”, OSDI 2002, Boston, MA,December 2015.
[6] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” in ACM journal of Wireless Network.
[7] V.Akila , Dr T.Sheela , "Preserving Data and Key Privacy in Data Aggregation in Wireless Sensor Networks” Second International Conference on Computing and Communication Technology,2017.
[8] Joyce Jose, M Prince and Josna Jose, “PEPPDA: Power Efficient Privacy Preserving Data Aggregation for Wireless Sensor Networks” IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology,2013.
[9] A.S.Poornima , B.B.Amberker. “ SEEDA : Secure End-to End DataAggregation in Wireless SensorNetworks" IEEE Seventh International Conference on Wireless and Optical Communication Networks 2010.
[10] H.S.Annapurna, M.Siddappa, “Secure Data Aggregation with Fault Tolerance in Wireless Sensor Networks”, IEEE International Conference on Emerging, Research in Electronics and Computer science Technology 2015.
[11] Riker, André, Eduardo Cerqueira, Marilia Curado, and Edmundo Monteiro, ”A two-tier adaptive data aggregation approach for M2M group communication”, IEEE Sensor Journal 16,no.3(2016).
[12] Kiran Maraiya, Kamal Kant, Nitin Gupta, “Wireless Sensor Network: A Review on Data Aggregation” ”, International Journal of Scientific & Engineering Research, Volume 2, Issue 4, 2011.
[13] P.Raghu Vamsi,Krishna Kant,“Secure data aggregation and Instrution detection in Wireless Sensor Networks”, IEEE International Conference on Signal Processing and Communication,2015.
[14] V.Vaidehi,R.Kayalvizhi,N.Chandra Sekar, “Secure Data Aggregation in Wireless Sensor Networks,”IEEE International Conference on Computing Sustainable Global Development,2015.
[15] Mohamed Ben Haj Frej, Khaled Elleithy, “Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks,” IEEE 14th International Conference on Machine Learning and Applications,2015.