Survey on data aggregation based security attacks in wireless sensor network

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Wireless sensor network (WSN) has applications in military, health care, environmental monitoring, infrastructure, industrial and commercial applications. The WSN is expected to maintain data integrity in all its network operations. However, due to the nature of wireless connectivity, WSN is prone to various attacks that alter or steal the data exchanged between the nodes. These attacks can disrupt the network processes and also the accuracy of its results. In this survey paper, we have reviewed various attacks available in the literature till date. We have also listed existing methods that focus on data aggregation based security mechanisms in WSN to counter the attacks. We have classified and compared these methods owing to their encryption techniques. This paper intends to support researchers to understand the basic attacks prevalent in WSN and schemes to counter such attacks.

References Powered by Scopus

Applications of wireless sensor networks: An up-to-date survey

636Citations
N/AReaders
Get full text

RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks

148Citations
N/AReaders
Get full text

A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks

132Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A COMPREHENSIVE DECISION ASSESSMENT FOR TRUST EVALUATION IN WIRELESS SENSOR NETWORKS

0Citations
N/AReaders
Get full text

Leveraging Security Modeling and Information Systems Audits to Mitigate Network Vulnerabilities

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Tabassum, N., Devanagavi, G. D., Biradar, R. C., & Ravindra, C. (2023). Survey on data aggregation based security attacks in wireless sensor network. International Journal of Electrical and Computer Engineering, 13(3), 3131–3139. https://doi.org/10.11591/ijece.v13i3.pp3131-3139

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

50%

Professor / Associate Prof. 1

25%

Lecturer / Post doc 1

25%

Readers' Discipline

Tooltip

Engineering 3

75%

Computer Science 1

25%

Save time finding and organizing research with Mendeley

Sign up for free