SlideShare a Scribd company logo
A survey on the privacy
preserving data aggregation in
wireless sensor networks
K.Sumanth
20951A04L1
Wcn
Introduction
• Wireless sensor network is made up of sensor nodes which collects information
about the environment and helps to understand and monitor the environment.
Now a day’s WSN assumes a key part in many real time applications like border
surveillance in military, seismic monitoring, weather monitoring, accident
reporting, health monitoring. But these sensor nodes have great concern for
efficient utilization of energy as they are equipped with low computational
power, less storage and less battery capacity. The major challenge is reducing
computation and communication cost. Communication cost depends on the
number of data moving in the network. This can be minimized by merging the
redundant data travelling over the network by using the technique called data
aggregation. The intermediate nremovinthe way to base station can aggregate
data either by removing the redundancy or by replacing the incoming data by
their aggregated representation which is based on the query being processed.
Thus the number of data packets transmitted are reduced which in turn reduce
the energy consumed by the WSN.
II SYSTEM MODEL
In sensor network, the sensor nodes can be organized and grouped as layers or
clusters. In layered networks the nodes are grouped such that all nodes in thesame
group can be reached from base station with same number of hops.
•In clustered networks, the sensor nodes
are grouped into clusters so that each
node inside a cluster comes under the
coverage of each other and controlled by a
cluster-head. Sensor nodes of same cluster
relay their detected information to their
group head. The group head advances the
got information to the Base Station (BS)
which is a door for different networks. Any
message can achieve the base station in at
most two bounces. The cluster head can
reduce the communication by acting as an
aggregator which will aggregate the data
sensed by all clustermembers before
forwarding it to BS. In most of the data
aggregation schemes like CDAMA, RCDA
nodes are organized as clusters.
III PRIVACY PRESERVING DATA AGGREGATION
PROTOCOLS
•The recent development in technology leads to the invention of miniature
sensors. Therefore, many applications have been proposed which are avaricious to
the network bandwidth, such as security surveillance and real-time target tracking.
Generally, a sensor node is equipped with a weak transceiver which does not
provide a large bandwidth.
•For this reason, the network design should strive to minimize the energy
consumption in propagating the data to the base-station. And most of the energy
in WSN is consumed by redundant information. Hence by eliminating data packets
carrying redundant information using data aggregation, energy can be saved.
Encrypted protocols:
•Encrypted protocols try to provide privacy by transforming the raw data into a
format which cannot be easily deciphered. But this requires pre distribution of
keys. And based on where encryption and decryption takes place, this encrypted
based protocols are again classified as hop by hop encryption based, privacy
homomorphism based , data slicing , secured multi party computation scheme. In
hop by hop encryption scheme, the data is decrypted before aggregation at every
intermediate aggregator node.
•Aggregation method is applied on raw data and encrypted again. It shows
distinguished performance for supporting data authentication, integrity and
confidentiality. But if the aggregator node is compromised, the sensitive data can
be easily revealed to attackers. So providing end-to-end data concealment to
protect privacy of data is the major challenge of this method.
Non-encrypted protocol
In data aggregation using watermarking method, watermark is embedded in the
original data. This prevents the adversaries from interpreting the actual
information being transferred from the sensor node to aggregator by embedding
watermarking in the original data. It does not require much calculation as in the
case of encrypted protocols. And it is also free from the need for generating and
distributing keys which consumes bandwidth and processor energy.
Concepts of Aggregation
•CDAMA (Concealed Data Aggregation for Multiple Applications) : This scheme is
proposed for cluster based wireless sensor network to provide secured data
aggregation using modified privacy homomorphism.
•RCDA (Recoverable Concealed Data Aggregation): This is a secured data
aggregation scheme for cluster based wireless sensor network. It ensures end to
end privacy of the data by using privacy homomorphism encryption.
•iPDA: This data slicing based aggregation scheme , splits the data into multiple
pieces and merges them at different levels of intermediate node.
•Hilbert-Curve Based Data Aggregation (HCBDA): This scheme proposes a novel
Hilbert-curve based data aggregation method that enforces data privacy and data
integrity for WSNs.
Integrity:
This ensures the consistency and trustworthiness of the data which can be
substantiated by the receiver. In CDAMA, The raw data of sensor nodes cannot be
separated from aggregated data. Hence integrity verification is limited .but RCDA
ensures the originality of data by attaching signature with the aggregated data
which can be verified by base station. But integrity and authenticity are not
ensured at aggregator level.
Data recovery:
It is the ability to recover individual sensor data from the aggregated value. In
CDAMA only application level aggregated data can be extracted by the base
station. Extracting individual sensor node is not supported. In RCDA the sensed
data from individual sensor nodes can be recovered. In iPDA only mixed up data is
available at the base station from the disjoint trees.
Conclusion:
In summary, CDAMA which support multi-application environment by
encapsulating the cipher text coming from different application into
one cipher text has high communication and computation cost and
does not provide support for integrity and different aggregation
function. RCDA, iPDA, HCBDA and CLWDA which ensure integrity is
limited to single application environment. We conclude that there is
always a tradeoff between different metrics in the design of various
aggregation schemes. The major challenge lies in customizing the
aggregations for various application domains with assured quality of
service.

More Related Content

Similar to wcn.pptx

S04404116120
S04404116120S04404116120
S04404116120
IJERA Editor
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
IJET - International Journal of Engineering and Techniques
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
International Journal of Reconfigurable and Embedded Systems
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
IJERA Editor
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
IDES Editor
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's finalsumavaidya90
 
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_finalEnergy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_finalGr Patel
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
ijasuc
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
IJERA Editor
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
Sharon Roberts
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
Vijay Karan
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
Shakas Technologies
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
Munazza63
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
Vijay Karan
 

Similar to wcn.pptx (20)

S04404116120
S04404116120S04404116120
S04404116120
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's final
 
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_finalEnergy consumption mitigation__routing_protocols_for_large_wsn's_final
Energy consumption mitigation__routing_protocols_for_large_wsn's_final
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Report
ReportReport
Report
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 

Recently uploaded

NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
Richard Gill
 
Toxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and ArsenicToxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and Arsenic
sanjana502982
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
NoelManyise1
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
Areesha Ahmad
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
kejapriya1
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
Areesha Ahmad
 
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
yqqaatn0
 
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdfDMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
fafyfskhan251kmf
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
tonzsalvador2222
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
yqqaatn0
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 

Recently uploaded (20)

NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
 
Toxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and ArsenicToxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and Arsenic
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
 
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
 
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdfDMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 

wcn.pptx

  • 1. A survey on the privacy preserving data aggregation in wireless sensor networks K.Sumanth 20951A04L1 Wcn
  • 2. Introduction • Wireless sensor network is made up of sensor nodes which collects information about the environment and helps to understand and monitor the environment. Now a day’s WSN assumes a key part in many real time applications like border surveillance in military, seismic monitoring, weather monitoring, accident reporting, health monitoring. But these sensor nodes have great concern for efficient utilization of energy as they are equipped with low computational power, less storage and less battery capacity. The major challenge is reducing computation and communication cost. Communication cost depends on the number of data moving in the network. This can be minimized by merging the redundant data travelling over the network by using the technique called data aggregation. The intermediate nremovinthe way to base station can aggregate data either by removing the redundancy or by replacing the incoming data by their aggregated representation which is based on the query being processed. Thus the number of data packets transmitted are reduced which in turn reduce the energy consumed by the WSN.
  • 3. II SYSTEM MODEL In sensor network, the sensor nodes can be organized and grouped as layers or clusters. In layered networks the nodes are grouped such that all nodes in thesame group can be reached from base station with same number of hops.
  • 4. •In clustered networks, the sensor nodes are grouped into clusters so that each node inside a cluster comes under the coverage of each other and controlled by a cluster-head. Sensor nodes of same cluster relay their detected information to their group head. The group head advances the got information to the Base Station (BS) which is a door for different networks. Any message can achieve the base station in at most two bounces. The cluster head can reduce the communication by acting as an aggregator which will aggregate the data sensed by all clustermembers before forwarding it to BS. In most of the data aggregation schemes like CDAMA, RCDA nodes are organized as clusters.
  • 5. III PRIVACY PRESERVING DATA AGGREGATION PROTOCOLS •The recent development in technology leads to the invention of miniature sensors. Therefore, many applications have been proposed which are avaricious to the network bandwidth, such as security surveillance and real-time target tracking. Generally, a sensor node is equipped with a weak transceiver which does not provide a large bandwidth. •For this reason, the network design should strive to minimize the energy consumption in propagating the data to the base-station. And most of the energy in WSN is consumed by redundant information. Hence by eliminating data packets carrying redundant information using data aggregation, energy can be saved.
  • 6. Encrypted protocols: •Encrypted protocols try to provide privacy by transforming the raw data into a format which cannot be easily deciphered. But this requires pre distribution of keys. And based on where encryption and decryption takes place, this encrypted based protocols are again classified as hop by hop encryption based, privacy homomorphism based , data slicing , secured multi party computation scheme. In hop by hop encryption scheme, the data is decrypted before aggregation at every intermediate aggregator node. •Aggregation method is applied on raw data and encrypted again. It shows distinguished performance for supporting data authentication, integrity and confidentiality. But if the aggregator node is compromised, the sensitive data can be easily revealed to attackers. So providing end-to-end data concealment to protect privacy of data is the major challenge of this method.
  • 7. Non-encrypted protocol In data aggregation using watermarking method, watermark is embedded in the original data. This prevents the adversaries from interpreting the actual information being transferred from the sensor node to aggregator by embedding watermarking in the original data. It does not require much calculation as in the case of encrypted protocols. And it is also free from the need for generating and distributing keys which consumes bandwidth and processor energy.
  • 8. Concepts of Aggregation •CDAMA (Concealed Data Aggregation for Multiple Applications) : This scheme is proposed for cluster based wireless sensor network to provide secured data aggregation using modified privacy homomorphism. •RCDA (Recoverable Concealed Data Aggregation): This is a secured data aggregation scheme for cluster based wireless sensor network. It ensures end to end privacy of the data by using privacy homomorphism encryption. •iPDA: This data slicing based aggregation scheme , splits the data into multiple pieces and merges them at different levels of intermediate node. •Hilbert-Curve Based Data Aggregation (HCBDA): This scheme proposes a novel Hilbert-curve based data aggregation method that enforces data privacy and data integrity for WSNs.
  • 9. Integrity: This ensures the consistency and trustworthiness of the data which can be substantiated by the receiver. In CDAMA, The raw data of sensor nodes cannot be separated from aggregated data. Hence integrity verification is limited .but RCDA ensures the originality of data by attaching signature with the aggregated data which can be verified by base station. But integrity and authenticity are not ensured at aggregator level. Data recovery: It is the ability to recover individual sensor data from the aggregated value. In CDAMA only application level aggregated data can be extracted by the base station. Extracting individual sensor node is not supported. In RCDA the sensed data from individual sensor nodes can be recovered. In iPDA only mixed up data is available at the base station from the disjoint trees.
  • 10. Conclusion: In summary, CDAMA which support multi-application environment by encapsulating the cipher text coming from different application into one cipher text has high communication and computation cost and does not provide support for integrity and different aggregation function. RCDA, iPDA, HCBDA and CLWDA which ensure integrity is limited to single application environment. We conclude that there is always a tradeoff between different metrics in the design of various aggregation schemes. The major challenge lies in customizing the aggregations for various application domains with assured quality of service.