Skip to content

advances in mechanical and electronic engineering volume 3 pdf

Sensor networks are the new paradigm for the future electronic communication.
Wireless nodes are deployed in large numbers inside or close to the inspected
phenomenon to form a wireless sensor network (WSN). Sensor networks may consist
of many different types of sensors, such as seismic, thermal, and radar, which can
monitor the environment or system by the measurement of physical parameters such
as temperature, pressure, relative humidity noise levels, etc [1].

Recently, WSN networks have been used in many promising applications including wildlife
monitoring, human health monitoring, or intelligent transportation systems, etc.
Since the sensor nodes are energy-constrained, data aggregation technology is
adopted to help the electronic communication between the BS and sensors energyefficient. As the sensor nodes may be deployed in remote and hostile environments,
attackers may control a sensor node and change the aggregation result or inject false
data into the WSNs easily.

Thus, the secure data aggregation becomes an important
research field in electronic communication technologies. In this paper, we identify the
threats and vulnerabilities to secure data aggregation for sensor networks by defining
the main attack issues. Our objective is to provide a deeper understanding of the
performance of current security data aggregation protocols in WSNs.