Mostrar el registro sencillo del ítem
An outline of data aggregation security in heterogeneous wireless sensor networks.
dc.contributor.author | BOUBICHE, SABRINA | |
dc.contributor.author | BOUBICHE, DJALLEL EDDINE | |
dc.contributor.author | BILAMI, AZZEDINE | |
dc.contributor.author | TORAL CRUZ, HOMERO | |
dc.date.accessioned | 2018-09-14T22:25:59Z | |
dc.date.available | 2018-09-14T22:25:59Z | |
dc.date.issued | 2016 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12249/1409 | |
dc.description.abstract | "Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem hasbe en widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach." | |
dc.description.provenance | Submitted by Yaremi Isabel Can Chulin ([email protected]) on 2018-09-14T22:25:59Z No. of bitstreams: 1 Boubiche-S_An-outline-of-data-aggregation-security-in-heterogeneous-wireless-sensor-networksOpen-Access_2016.pdf: 2866859 bytes, checksum: 5041939ad3b2a44803f14ce981974a5e (MD5) | |
dc.description.provenance | Made available in DSpace on 2018-09-14T22:25:59Z (GMT). No. of bitstreams: 1 Boubiche-S_An-outline-of-data-aggregation-security-in-heterogeneous-wireless-sensor-networksOpen-Access_2016.pdf: 2866859 bytes, checksum: 5041939ad3b2a44803f14ce981974a5e (MD5) Previous issue date: 2016 | |
dc.format | ||
dc.language.iso | eng | |
dc.publisher | MDPI | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0 | |
dc.source | Sensors | |
dc.subject | Data Aggregation | |
dc.subject | Wireless Sensor Network | |
dc.subject | Heterogeneity | |
dc.subject | Security | |
dc.subject.classification | CIENCIAS FÍSICO MATEMÁTICAS Y CIENCIAS DE LA TIERRA::MATEMÁTICAS::CIENCIA DE LOS ORDENADORES | |
dc.title | An outline of data aggregation security in heterogeneous wireless sensor networks. | |
dc.type | Artículo | |
dc.type.conacyt | article | |
dc.rights.acces | openAccess | |
dc.identificator | 1||12||1203 | |
dc.audience | generalPublic | |
dc.identifier.doi | 10.3390/s16040525 | |
dc.division | Biblioteca Unidad Académica Chetumal, Santiago Pacheco Cruz |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Artículos [192]