Survey on Wireless Sensor Network

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-4
Year of Publication : 2019
Authors : Mrs.Syeda Jabben Fathima
DOI :  10.14445/22312803/IJCTT-V67I4P119

MLA

MLA Style:Mrs.Syeda Jabben Fathima"Survey on Wireless Sensor Network" International Journal of Computer Trends and Technology 67.4 (2019): 85-90.

APA Style:Mrs.Syeda Jabben Fathima (2019). Survey on Wireless Sensor Network. International Journal of Computer Trends and Technology, 67(4), 85-90.

Abstract
There are several applications for wireless sensor networks it has assured exceptional features. Data aggregation mainly deals with data gathering and aggregates the data in an energy efficient way so that the network lifetime is improved. Data transmission in WSN is based on cluster-based method. In this method respective node transfers the data to cluster head and cluster head combination of the data and transfer it to the base station. WSN has application in vital areas, therefore security is very important. Wireless sensor network has numerous applications as it has positive unique features. WSN has several applications in following and observing the background. It includes of distributed sensor nodes where location plays and key role in collecting information. The sensor nodes collect the information and transmission it to the base station. Key concern in WSN is energy utilization in transmitting of data information. To overwhelmed this difficult data aggregation technique was applied. Data aggregation primarily deals with data information collecting and combinations the data information in an energy effective way so that the network lifespan is improved.

Reference
[1] M. Allahbakhsh and A. Ignjatovic, “An iterative method for calculating robust rating scores,” Parallel and Distributed Systems, IEEE Transac- tions on, vol. 26, no. 2, pp. 340–350, 2015.
[2] M. Rezvani, A. Ignjatovic, E. Bertino, and S. Jha, “Secure data aggrega- tion technique for wireless sensor networks in the presence of collusion attacks,” Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 98–110, 2015.
[3] Xu Jian, Yang Geng, Chen Zhengyu, Wang Qianqian “A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks”China Communications, vol. 12, no. 5, pp. 162–170, 2015.
[4] V. Kumar and S. Madria, “Pip: Privacy and integrity preserving data ag- gregation in wireless sensor networks,” in Reliable Distributed Systems (SRDS), 2013 IEEE 32nd International Symposium on. IEEE, 2013, pp.10–19.
[5] Q. Zhou,G.Yang,andL.He,“An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, 2014.
[6] C.-M. Chen, Y.-H. Lin, Y.-C. Lin, and H.-M. Sun, “Rcda: recoverable concealed data aggregation for data integrity in wireless sensor net- works,” ParallelandDistributedSystems,IEEETransactionson,vol.23, no. 4, pp. 727–734, 2012.
[7] Y.-H. Lin, S.-Y. Chang, and H.-M. Sun, “Cdama: concealed data aggre- gation scheme for multiple applications in wireless sensor networks,” Knowledge and Data Engineering, IEEE Transactions on, vol. 25, no.7, pp. 1471–1483,2013.
[8] B. Przydatek, D. Song, and A. Perrig, “Sia: Secure information aggregation in sensor networks,” in Proceedings of the 1st international conference on Embedded networked sensor systems. ACM, 2003, pp. 255–265.
[9] Y. Yang, X. Wang, S. Zhu, and G. Cao, “Sdap: A secure hop-by-hop data aggregation protocol for sensor networks,” ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 4, p. 18, 2008.
[10] E. Mykletun, J. Girao, and D. Westhoff, “Public key based cryp- toschemes for data concealment in wireless sensor networks,” in Com- munications, 2006. ICC’06. IEEE International Conference on, vol. 5. IEEE, 2006, pp.2288–2295.

Keywords
Wireless Sensor Network, Data Aggregation, MAC, Performance, Sensor Nodes