Wireless Sensor Networks are vulnerable to communication failures and security attacks. It is quite challenging to provide security to data aggregation. This paper proposes Authenticated Data Aggregation for Wireless Sensor Networks, where the nodes organize themselves into tiers around the sink. Message Authentication Code (MAC) is generated and transmitted along with the synopsis to ensure integrity. All nodes in the network store the same key that is used for rekeying operation during each round to generate MAC. Thus ADA ensures data freshness and integrity at a communication cost of O (1). Simulation results show that the proposed ADA protocol results in high security, low energy consumption and low communication cost compared to the st...
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks an...
Wireless Sensor Network consists of sensor nodes that are constrained in energy and other resources ...
Data aggregation is a widely used technique in wireless sensor networks. The security issues, data c...
Securing the aggregated data of the wireless sensor networks (WSNs) is a vital issue to minimize ene...
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in gene...
Wireless sensor networks have many sensor devices that send their data to the sink or base station f...
Wireless sensor networks are energy constrained. Data aggregation is an important mechanism for achi...
Wireless sensor networks (WSNs) are normally composed of low powered, inexpensive device that is con...
Abstract—Data aggregation is a key challenging task in wireless senor network to reduce energy consu...
In wireless sensor networks, secure data aggregation is very important for reducing the quantity of ...
Abstract — A wireless sensor network consists of spatially distributed autonomous sensors to monitor...
Nowadays, Wireless Sensor Networks (WSN’s) are becoming more and more promising and applicable to a ...
AbstractThe main objective of this paper is to aggregate the data in a secure way such that the tamp...
With the rapid development of wireless communication technology, sensor technology, information acqu...
Wireless Sensor Networks are susceptible to communication failures and security attacks due to broad...
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks an...
Wireless Sensor Network consists of sensor nodes that are constrained in energy and other resources ...
Data aggregation is a widely used technique in wireless sensor networks. The security issues, data c...
Securing the aggregated data of the wireless sensor networks (WSNs) is a vital issue to minimize ene...
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in gene...
Wireless sensor networks have many sensor devices that send their data to the sink or base station f...
Wireless sensor networks are energy constrained. Data aggregation is an important mechanism for achi...
Wireless sensor networks (WSNs) are normally composed of low powered, inexpensive device that is con...
Abstract—Data aggregation is a key challenging task in wireless senor network to reduce energy consu...
In wireless sensor networks, secure data aggregation is very important for reducing the quantity of ...
Abstract — A wireless sensor network consists of spatially distributed autonomous sensors to monitor...
Nowadays, Wireless Sensor Networks (WSN’s) are becoming more and more promising and applicable to a ...
AbstractThe main objective of this paper is to aggregate the data in a secure way such that the tamp...
With the rapid development of wireless communication technology, sensor technology, information acqu...
Wireless Sensor Networks are susceptible to communication failures and security attacks due to broad...
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks an...
Wireless Sensor Network consists of sensor nodes that are constrained in energy and other resources ...
Data aggregation is a widely used technique in wireless sensor networks. The security issues, data c...