SlideShare a Scribd company logo
1 of 10
A survey on the privacy
preserving data aggregation in
wireless sensor networks
K.Sumanth
20951A04L1
Wcn
Introduction
• Wireless sensor network is made up of sensor nodes which collects information
about the environment and helps to understand and monitor the environment.
Now a day’s WSN assumes a key part in many real time applications like border
surveillance in military, seismic monitoring, weather monitoring, accident
reporting, health monitoring. But these sensor nodes have great concern for
efficient utilization of energy as they are equipped with low computational
power, less storage and less battery capacity. The major challenge is reducing
computation and communication cost. Communication cost depends on the
number of data moving in the network. This can be minimized by merging the
redundant data travelling over the network by using the technique called data
aggregation. The intermediate nremovinthe way to base station can aggregate
data either by removing the redundancy or by replacing the incoming data by
their aggregated representation which is based on the query being processed.
Thus the number of data packets transmitted are reduced which in turn reduce
the energy consumed by the WSN.
II SYSTEM MODEL
In sensor network, the sensor nodes can be organized and grouped as layers or
clusters. In layered networks the nodes are grouped such that all nodes in thesame
group can be reached from base station with same number of hops.
•In clustered networks, the sensor nodes
are grouped into clusters so that each
node inside a cluster comes under the
coverage of each other and controlled by a
cluster-head. Sensor nodes of same cluster
relay their detected information to their
group head. The group head advances the
got information to the Base Station (BS)
which is a door for different networks. Any
message can achieve the base station in at
most two bounces. The cluster head can
reduce the communication by acting as an
aggregator which will aggregate the data
sensed by all clustermembers before
forwarding it to BS. In most of the data
aggregation schemes like CDAMA, RCDA
nodes are organized as clusters.
III PRIVACY PRESERVING DATA AGGREGATION
PROTOCOLS
•The recent development in technology leads to the invention of miniature
sensors. Therefore, many applications have been proposed which are avaricious to
the network bandwidth, such as security surveillance and real-time target tracking.
Generally, a sensor node is equipped with a weak transceiver which does not
provide a large bandwidth.
•For this reason, the network design should strive to minimize the energy
consumption in propagating the data to the base-station. And most of the energy
in WSN is consumed by redundant information. Hence by eliminating data packets
carrying redundant information using data aggregation, energy can be saved.
Encrypted protocols:
•Encrypted protocols try to provide privacy by transforming the raw data into a
format which cannot be easily deciphered. But this requires pre distribution of
keys. And based on where encryption and decryption takes place, this encrypted
based protocols are again classified as hop by hop encryption based, privacy
homomorphism based , data slicing , secured multi party computation scheme. In
hop by hop encryption scheme, the data is decrypted before aggregation at every
intermediate aggregator node.
•Aggregation method is applied on raw data and encrypted again. It shows
distinguished performance for supporting data authentication, integrity and
confidentiality. But if the aggregator node is compromised, the sensitive data can
be easily revealed to attackers. So providing end-to-end data concealment to
protect privacy of data is the major challenge of this method.
Non-encrypted protocol
In data aggregation using watermarking method, watermark is embedded in the
original data. This prevents the adversaries from interpreting the actual
information being transferred from the sensor node to aggregator by embedding
watermarking in the original data. It does not require much calculation as in the
case of encrypted protocols. And it is also free from the need for generating and
distributing keys which consumes bandwidth and processor energy.
Concepts of Aggregation
•CDAMA (Concealed Data Aggregation for Multiple Applications) : This scheme is
proposed for cluster based wireless sensor network to provide secured data
aggregation using modified privacy homomorphism.
•RCDA (Recoverable Concealed Data Aggregation): This is a secured data
aggregation scheme for cluster based wireless sensor network. It ensures end to
end privacy of the data by using privacy homomorphism encryption.
•iPDA: This data slicing based aggregation scheme , splits the data into multiple
pieces and merges them at different levels of intermediate node.
•Hilbert-Curve Based Data Aggregation (HCBDA): This scheme proposes a novel
Hilbert-curve based data aggregation method that enforces data privacy and data
integrity for WSNs.
Integrity:
This ensures the consistency and trustworthiness of the data which can be
substantiated by the receiver. In CDAMA, The raw data of sensor nodes cannot be
separated from aggregated data. Hence integrity verification is limited .but RCDA
ensures the originality of data by attaching signature with the aggregated data
which can be verified by base station. But integrity and authenticity are not
ensured at aggregator level.
Data recovery:
It is the ability to recover individual sensor data from the aggregated value. In
CDAMA only application level aggregated data can be extracted by the base
station. Extracting individual sensor node is not supported. In RCDA the sensed
data from individual sensor nodes can be recovered. In iPDA only mixed up data is
available at the base station from the disjoint trees.
Conclusion:
In summary, CDAMA which support multi-application environment by
encapsulating the cipher text coming from different application into
one cipher text has high communication and computation cost and
does not provide support for integrity and different aggregation
function. RCDA, iPDA, HCBDA and CLWDA which ensure integrity is
limited to single application environment. We conclude that there is
always a tradeoff between different metrics in the design of various
aggregation schemes. The major challenge lies in customizing the
aggregations for various application domains with assured quality of
service.

More Related Content

Similar to wcn.pptx

An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's final
sumavaidya90
 
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_finalEnergy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
Gr Patel
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
ijasuc
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
Sharon Roberts
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 

Similar to wcn.pptx (20)

S04404116120
S04404116120S04404116120
S04404116120
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's final
 
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_finalEnergy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Report
ReportReport
Report
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 

Recently uploaded

Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Sérgio Sacani
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
AlMamun560346
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
Lokesh Kothari
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
ssuser79fe74
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
Areesha Ahmad
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Lokesh Kothari
 

Recently uploaded (20)

9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
American Type Culture Collection (ATCC).pptx
American Type Culture Collection (ATCC).pptxAmerican Type Culture Collection (ATCC).pptx
American Type Culture Collection (ATCC).pptx
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 

wcn.pptx

  • 1. A survey on the privacy preserving data aggregation in wireless sensor networks K.Sumanth 20951A04L1 Wcn
  • 2. Introduction • Wireless sensor network is made up of sensor nodes which collects information about the environment and helps to understand and monitor the environment. Now a day’s WSN assumes a key part in many real time applications like border surveillance in military, seismic monitoring, weather monitoring, accident reporting, health monitoring. But these sensor nodes have great concern for efficient utilization of energy as they are equipped with low computational power, less storage and less battery capacity. The major challenge is reducing computation and communication cost. Communication cost depends on the number of data moving in the network. This can be minimized by merging the redundant data travelling over the network by using the technique called data aggregation. The intermediate nremovinthe way to base station can aggregate data either by removing the redundancy or by replacing the incoming data by their aggregated representation which is based on the query being processed. Thus the number of data packets transmitted are reduced which in turn reduce the energy consumed by the WSN.
  • 3. II SYSTEM MODEL In sensor network, the sensor nodes can be organized and grouped as layers or clusters. In layered networks the nodes are grouped such that all nodes in thesame group can be reached from base station with same number of hops.
  • 4. •In clustered networks, the sensor nodes are grouped into clusters so that each node inside a cluster comes under the coverage of each other and controlled by a cluster-head. Sensor nodes of same cluster relay their detected information to their group head. The group head advances the got information to the Base Station (BS) which is a door for different networks. Any message can achieve the base station in at most two bounces. The cluster head can reduce the communication by acting as an aggregator which will aggregate the data sensed by all clustermembers before forwarding it to BS. In most of the data aggregation schemes like CDAMA, RCDA nodes are organized as clusters.
  • 5. III PRIVACY PRESERVING DATA AGGREGATION PROTOCOLS •The recent development in technology leads to the invention of miniature sensors. Therefore, many applications have been proposed which are avaricious to the network bandwidth, such as security surveillance and real-time target tracking. Generally, a sensor node is equipped with a weak transceiver which does not provide a large bandwidth. •For this reason, the network design should strive to minimize the energy consumption in propagating the data to the base-station. And most of the energy in WSN is consumed by redundant information. Hence by eliminating data packets carrying redundant information using data aggregation, energy can be saved.
  • 6. Encrypted protocols: •Encrypted protocols try to provide privacy by transforming the raw data into a format which cannot be easily deciphered. But this requires pre distribution of keys. And based on where encryption and decryption takes place, this encrypted based protocols are again classified as hop by hop encryption based, privacy homomorphism based , data slicing , secured multi party computation scheme. In hop by hop encryption scheme, the data is decrypted before aggregation at every intermediate aggregator node. •Aggregation method is applied on raw data and encrypted again. It shows distinguished performance for supporting data authentication, integrity and confidentiality. But if the aggregator node is compromised, the sensitive data can be easily revealed to attackers. So providing end-to-end data concealment to protect privacy of data is the major challenge of this method.
  • 7. Non-encrypted protocol In data aggregation using watermarking method, watermark is embedded in the original data. This prevents the adversaries from interpreting the actual information being transferred from the sensor node to aggregator by embedding watermarking in the original data. It does not require much calculation as in the case of encrypted protocols. And it is also free from the need for generating and distributing keys which consumes bandwidth and processor energy.
  • 8. Concepts of Aggregation •CDAMA (Concealed Data Aggregation for Multiple Applications) : This scheme is proposed for cluster based wireless sensor network to provide secured data aggregation using modified privacy homomorphism. •RCDA (Recoverable Concealed Data Aggregation): This is a secured data aggregation scheme for cluster based wireless sensor network. It ensures end to end privacy of the data by using privacy homomorphism encryption. •iPDA: This data slicing based aggregation scheme , splits the data into multiple pieces and merges them at different levels of intermediate node. •Hilbert-Curve Based Data Aggregation (HCBDA): This scheme proposes a novel Hilbert-curve based data aggregation method that enforces data privacy and data integrity for WSNs.
  • 9. Integrity: This ensures the consistency and trustworthiness of the data which can be substantiated by the receiver. In CDAMA, The raw data of sensor nodes cannot be separated from aggregated data. Hence integrity verification is limited .but RCDA ensures the originality of data by attaching signature with the aggregated data which can be verified by base station. But integrity and authenticity are not ensured at aggregator level. Data recovery: It is the ability to recover individual sensor data from the aggregated value. In CDAMA only application level aggregated data can be extracted by the base station. Extracting individual sensor node is not supported. In RCDA the sensed data from individual sensor nodes can be recovered. In iPDA only mixed up data is available at the base station from the disjoint trees.
  • 10. Conclusion: In summary, CDAMA which support multi-application environment by encapsulating the cipher text coming from different application into one cipher text has high communication and computation cost and does not provide support for integrity and different aggregation function. RCDA, iPDA, HCBDA and CLWDA which ensure integrity is limited to single application environment. We conclude that there is always a tradeoff between different metrics in the design of various aggregation schemes. The major challenge lies in customizing the aggregations for various application domains with assured quality of service.