Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tham khảo tài liệu 'emerging communications for wireless sensor networks part 12', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | Secure Data Aggregation in Wireless Sensor Networks 213 Each protocol designers solved the data aggregation security from different angles. For example some designers solved the problem by considering either single aggregator model or multiple aggregator model. Each model has its own challenges that need to be considered carefully. End-to-end encryption for example is easier to implement in the single aggregator model than the multiple aggregator model. However the energy consumption at the single aggregator model has to be minimized in order to extend the network lifetime and enhance data availability service. There is no standard adversarial model where current secure data aggregation protocols compete to provide a higher level of security or resilience to attacks discussed in Section 3.1. For example secure data aggregation protocols that defeat type I adversary are secure in the face of SY SF and RE attacks. However this resilience against these attacks is not provided by the protocol itself but is due to the limited capabilities of type I adversary as discussed in Section 3. Existing secure data aggregation protocols consequently are compared in a number of different ways the aggregation model they follow security services they provide cryptographic primitives they use and resilience against attacks described in section 3.1. Fig. 4. Classification of current secure data aggregation protocols. 5.1 Aggregation Models Based on our discussion in Section 4 current secure data aggregation protocols fall under either single aggregator model or multiple aggregator model. A sketch of these two aggregation models can be found in Figure 2. The aggregation process in the single aggregator model takes place once between the sensing nodes and the base station or the querier. All collected physical phenomena PP in WSNs therefore travel to only one aggregator point in the network before reaching the querier. On the other hand collected data in WSNs are aggregated more than .